Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-37920 (GCVE-0-2023-37920)
Vulnerability from cvelistv5
- CWE-345 - Insufficient Verification of Data Authenticity
Vendor | Product | Version | ||
---|---|---|---|---|
certifi | python-certifi |
Version: >= 2015.04.28, < 2023.07.22 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-12T16:02:55.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "name": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "name": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" }, { "url": "https://security.netapp.com/advisory/ntap-20240912-0002/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37920", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-05T18:38:32.972572Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-05T18:47:15.819Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "python-certifi", "vendor": "certifi", "versions": [ { "status": "affected", "version": "\u003e= 2015.04.28, \u003c 2023.07.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-12T05:07:57.236Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "name": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "name": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A", "tags": [ "x_refsource_MISC" ], "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" } ], "source": { "advisory": "GHSA-xqr8-7jwr-rhp7", "discovery": "UNKNOWN" }, "title": "Certifi\u0027s removal of e-Tugra root certificate" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-37920", "datePublished": "2023-07-25T20:45:35.286Z", "dateReserved": "2023-07-10T17:51:29.612Z", "dateUpdated": "2025-03-05T18:47:15.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-37920\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-07-25T21:15:10.827\",\"lastModified\":\"2025-02-13T13:50:15.813\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \\\"e-Tugra\\\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \\\"e-Tugra\\\" from the root store.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-345\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*\",\"versionStartIncluding\":\"2015.4.28\",\"versionEndExcluding\":\"2023.7.22\",\"matchCriteriaId\":\"2FF2392F-9661-448D-BE25-4AD98BD5D808\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*\",\"matchCriteriaId\":\"E8F29E19-3A64-4426-A2AA-F169440267CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86B51137-28D9-41F2-AFA2-3CC22B4954D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4455CF3A-CC91-4BE4-A7AB-929AC82E34F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_mediator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DD87DA-6999-4B38-B953-BEC49760F2BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire_\\\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452B464-1200-4B72-9A89-42DC58486191\"}]}]}],\"references\":[{\"url\":\"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240912-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\", \"name\": \"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\", \"name\": \"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\", \"name\": \"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240912-0002/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-09-12T16:02:55.011Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-37920\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-05T18:38:32.972572Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-05T18:38:34.792Z\"}}], \"cna\": {\"title\": \"Certifi\u0027s removal of e-Tugra root certificate\", \"source\": {\"advisory\": \"GHSA-xqr8-7jwr-rhp7\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"certifi\", \"product\": \"python-certifi\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2015.04.28, \u003c 2023.07.22\"}]}], \"references\": [{\"url\": \"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\", \"name\": \"https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\", \"name\": \"https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\", \"name\": \"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \\\"e-Tugra\\\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \\\"e-Tugra\\\" from the root store.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-345\", \"description\": \"CWE-345: Insufficient Verification of Data Authenticity\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-08-12T05:07:57.236Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-37920\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-05T18:47:15.819Z\", \"dateReserved\": \"2023-07-10T17:51:29.612Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-07-25T20:45:35.286Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
wid-sec-w-2023-2964
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, um Code auszuf\u00fchren und um nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2964 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2964.json" }, { "category": "self", "summary": "WID-SEC-2023-2964 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2964" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1103 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1103" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1104 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1104" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1101 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1101" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1102 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1102" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1105" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1106" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2023-1107 vom 2023-11-16", "url": "https://advisory.splunk.com//advisories/SVD-2023-1107" }, { "category": "external", "summary": "PoC auf Nathans Security Blog vom 2023-11-16", "url": "https://blog.hrncirik.net/cve-2023-46214-analysis" }, { "category": "external", "summary": "IBM Security Bulletin 7101062 vom 2023-12-21", "url": "https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2387 vom 2024-01-10", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2387.html" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0109 vom 2024-01-22", "url": "https://advisory.splunk.com//advisories/SVD-2024-0109" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0464 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0464" }, { "category": "external", "summary": "IBM Security Bulletin 7117884 vom 2024-02-14", "url": "https://www.ibm.com/support/pages/node/7117884" }, { "category": "external", "summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04", "url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1155 vom 2024-03-06", "url": "https://access.redhat.com/errata/RHSA-2024:1155" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1383 vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "category": "external", "summary": "IBM Security Bulletin 7148094 vom 2024-04-11", "url": "https://www.ibm.com/support/pages/node/7148094" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-012 vom 2024-07-02", "url": "https://www.dell.com/support/kbdoc/de-de/000226582/dsa-2024-012-security-update-for-dell-networker-virtual-edition-networker-management-console-multiple-component-vulnerabilities" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02", "url": "https://advisory.splunk.com/advisories/SVD-2024-0718" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12", "url": "https://advisory.splunk.com//advisories/SVD-2024-0801" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14", "url": "https://advisory.splunk.com//advisories/SVD-2024-1012" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-6AA3B5248F vom 2024-12-08", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-6aa3b5248f" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-C4377D35E6 vom 2024-12-08", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c4377d35e6" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-D335B971E7 vom 2024-12-08", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d335b971e7" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-11189 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-11189.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:0892 vom 2025-02-03", "url": "https://access.redhat.com/errata/RHSA-2025:0892" } ], "source_lang": "en-US", "title": "Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-02-02T23:00:00.000+00:00", "generator": { "date": "2025-02-03T13:06:57.595+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2023-2964", "initial_release_date": "2023-11-16T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-11-27T23:00:00.000+00:00", "number": "2", "summary": "PoC aufgenommen" }, { "date": "2023-12-21T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-09T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-14T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-03-03T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2024-03-05T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-19T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-11T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Dell und Splunk-SVD aufgenommen" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-10-14T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-12-08T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-02-02T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker", "product": { "name": "Dell NetWorker", "product_id": "T024663", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.3", "product": { "name": "IBM AIX 7.3", "product_id": "1139691", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "4.1", "product": { "name": "IBM VIOS 4.1", "product_id": "1522854", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:4.1" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise", "product": { "name": "Splunk Splunk Enterprise", "product_id": "T008911", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:-" } } }, { "category": "product_version_range", "name": "\u003c9.0.7", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.7", "product_id": "T031266" } }, { "category": "product_version", "name": "9.0.7", "product": { "name": "Splunk Splunk Enterprise 9.0.7", "product_id": "T031266-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.7" } } }, { "category": "product_version_range", "name": "\u003c9.1.2", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.2", "product_id": "T031267" } }, { "category": "product_version", "name": "9.1.2", "product": { "name": "Splunk Splunk Enterprise 9.1.2", "product_id": "T031267-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.2" } } }, { "category": "product_version_range", "name": "\u003c9.0.8", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.8", "product_id": "T032269" } }, { "category": "product_version", "name": "9.0.8", "product": { "name": "Splunk Splunk Enterprise 9.0.8", "product_id": "T032269-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.8" } } }, { "category": "product_version_range", "name": "\u003c9.1.3", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.3", "product_id": "T032270" } }, { "category": "product_version", "name": "9.1.3", "product": { "name": "Splunk Splunk Enterprise 9.1.3", "product_id": "T032270-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.3" } } }, { "category": "product_version_range", "name": "\u003c9.2.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.1", "product_id": "T033705" } }, { "category": "product_version", "name": "9.2.1", "product": { "name": "Splunk Splunk Enterprise 9.2.1", "product_id": "T033705-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.2.1" } } }, { "category": "product_version_range", "name": "\u003c9.1.4", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.4", "product_id": "T033718" } }, { "category": "product_version", "name": "9.1.4", "product": { "name": "Splunk Splunk Enterprise 9.1.4", "product_id": "T033718-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.4" } } }, { "category": "product_version_range", "name": "\u003c9.0.9", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.9", "product_id": "T033720" } }, { "category": "product_version", "name": "9.0.9", "product": { "name": "Splunk Splunk Enterprise 9.0.9", "product_id": "T033720-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.9" } } }, { "category": "product_version_range", "name": "\u003c9.3.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.3.1", "product_id": "T038314" } }, { "category": "product_version", "name": "9.3.1", "product": { "name": "Splunk Splunk Enterprise 9.3.1", "product_id": "T038314-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.3.1" } } }, { "category": "product_version_range", "name": "\u003c9.2.3", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.3", "product_id": "T038315" } }, { "category": "product_version", "name": "9.2.3", "product": { "name": "Splunk Splunk Enterprise 9.2.3", "product_id": "T038315-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.2.3" } } }, { "category": "product_version_range", "name": "\u003c9.1.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.6", "product_id": "T038316" } }, { "category": "product_version", "name": "9.1.6", "product": { "name": "Splunk Splunk Enterprise 9.1.6", "product_id": "T038316-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.6" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-22570", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2021-22570" }, { "cve": "CVE-2022-25883", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2022-25883" }, { "cve": "CVE-2022-31799", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2022-31799" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-3446", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-3446" }, { "cve": "CVE-2023-37920", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-37920" }, { "cve": "CVE-2023-3817", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-3817" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44270", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-44270" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Enterprise bez\u00fcglich verwendeter Komponenten von Drittanbietern, wie z.B. \"OpenSSL\", \"Python\", \"protobuf\" und \"bottle\". Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-45803" }, { "cve": "CVE-2023-46213", "notes": [ { "category": "description", "text": "In Splunk Enterprise wurde eine Cross-Site-Scripting-Schwachstelle entdeckt. Dies wird durch unsachgem\u00e4\u00dfe Filterung der vom Benutzer eingegebenen Daten in der \"Show Syntax Highlighted\"-Ansicht auf der \"Search Page\" verursacht, bevor die Eingaben angezeigt werden. Ein entfernter, authentifizierter Angreifer kann dies ausnutzen, um beliebigen Skriptcode im Sicherheitskontext einer betroffenen Site auszuf\u00fchren. Ein erfolgreicher Ausnutzen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-46213" }, { "cve": "CVE-2023-46214", "notes": [ { "category": "description", "text": "In Splunk Enterprise existiert eine Schwachstelle. Eingaben im XSLT Format (extensible stylesheet language transformations) werden nicht ausreichend gepr\u00fcft. Ein Angreifer kann durch das Hochladen einer b\u00f6srtig gestalteten XSLT Datei beliebigen Code ausf\u00fchren." } ], "product_status": { "known_affected": [ "T032269", "T031267", "T031266", "T033720", "67646", "T008911", "1522854", "T038314", "T015632", "T032270", "T038315", "T038316", "T004914", "74185", "T022954", "1139691", "T024663", "T033718", "398363", "T033705" ] }, "release_date": "2023-11-16T23:00:00.000+00:00", "title": "CVE-2023-46214" } ] }
wid-sec-w-2023-2862
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um vertrauliche Informationen offenzulegen oder einen nicht n\u00e4her spezifizierten Angriff zu starten.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2862 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2862.json" }, { "category": "self", "summary": "WID-SEC-2023-2862 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2862" }, { "category": "external", "summary": "RedHat Security Advisory vom 2023-11-08", "url": "https://access.redhat.com/errata/RHSA-2023:6812" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6473-2 vom 2023-11-15", "url": "https://ubuntu.com/security/notices/USN-6473-2" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7407 vom 2023-11-21", "url": "https://access.redhat.com/errata/RHSA-2023:7407" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7378 vom 2023-11-21", "url": "https://access.redhat.com/errata/RHSA-2023:7378" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7435 vom 2023-11-21", "url": "https://access.redhat.com/errata/RHSA-2023:7435" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7385 vom 2023-11-21", "url": "https://access.redhat.com/errata/RHSA-2023:7385" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7528 vom 2023-11-28", "url": "https://access.redhat.com/errata/RHSA-2023:7528" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7523 vom 2023-11-28", "url": "https://access.redhat.com/errata/RHSA-2023:7523" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:7753 vom 2023-12-13", "url": "https://access.redhat.com/errata/RHSA-2023:7753" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2023-7753 vom 2023-12-19", "url": "https://linux.oracle.com/errata/ELSA-2023-7753.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0116 vom 2024-01-11", "url": "http://linux.oracle.com/errata/ELSA-2024-0116.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0116 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0116" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0133 vom 2024-01-10", "url": "https://access.redhat.com/errata/RHSA-2024:0133" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0133 vom 2024-01-13", "url": "http://linux.oracle.com/errata/ELSA-2024-0133.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0187 vom 2024-01-17", "url": "https://access.redhat.com/errata/RHSA-2024:0187" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0300 vom 2024-01-19", "url": "https://access.redhat.com/errata/RHSA-2024:0300" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0464 vom 2024-01-25", "url": "https://linux.oracle.com/errata/ELSA-2024-0464.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0464 vom 2024-01-25", "url": "https://access.redhat.com/errata/RHSA-2024:0464" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0588 vom 2024-01-30", "url": "https://access.redhat.com/errata/RHSA-2024:0588" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:0322 vom 2024-02-07", "url": "https://access.redhat.com/errata/RHSA-2024:0733" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:1383 vom 2024-03-19", "url": "https://access.redhat.com/errata/RHSA-2024:1383" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2159 vom 2024-04-30", "url": "https://access.redhat.com/errata/RHSA-2024:2159" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2987" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2986 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2986" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2985 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2985" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2987 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2987.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2985 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2985.html" }, { "category": "external", "summary": "IBM Security Bulletin 7173420 vom 2024-10-17", "url": "https://www.ibm.com/support/pages/node/7173420" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8228 vom 2024-10-22", "url": "https://access.redhat.com/errata/RHSA-2024:8228" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23", "url": "https://access.redhat.com/errata/RHSA-2024:8318" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20241213-0007 vom 2024-12-13", "url": "https://security.netapp.com/advisory/ntap-20241213-0007/" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-12T23:00:00.000+00:00", "generator": { "date": "2024-12-13T12:42:16.264+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2023-2862", "initial_release_date": "2023-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-11-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-11-21T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-11-28T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-12T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-12-19T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-10T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-01-14T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-01-16T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-18T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2024-01-30T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-07T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-03-19T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-04-29T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-10-17T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-10-22T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-12-12T23:00:00.000+00:00", "number": "21", "summary": "Neue Updates von NetApp aufgenommen" } ], "status": "final", "version": "21" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "T037607", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "T030999", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.17.2", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.17.2", "product_id": "T038527" } }, { "category": "product_version", "name": "Container Platform 4.17.2", "product": { "name": "Red Hat OpenShift Container Platform 4.17.2", "product_id": "T038527-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform__4.17.2" } } } ], "category": "product_name", "name": "OpenShift" }, { "branches": [ { "category": "product_version_range", "name": "\u003c17.1", "product": { "name": "Red Hat OpenStack \u003c17.1", "product_id": "T029321" } }, { "category": "product_version", "name": "17.1", "product": { "name": "Red Hat OpenStack 17.1", "product_id": "T029321-fixed", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:17.1" } } } ], "category": "product_name", "name": "OpenStack" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux, die auftritt, wenn das e-Tugra-Root-Zertifikat in Certifi entfernt wird. Ein Angreifer kann diese Schwachstelle ausnutzen, um nicht spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T029321", "T037607", "67646", "T038527", "T000126", "T030999", "T004914" ] }, "release_date": "2023-11-08T23:00:00.000+00:00", "title": "CVE-2023-37920" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Red Hat Enterprise Linux. Dieser Fehler besteht in der urllib3-Komponente, die es erm\u00f6glicht, einen `Cookie`-Header zu spezifizieren und unwissentlich Informationen \u00fcber HTTP-Umleitungen zu einem anderen Ursprung weiterzugeben. Ein entfernter, authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T029321", "T037607", "67646", "T038527", "T000126", "T030999", "T004914" ] }, "release_date": "2023-11-08T23:00:00.000+00:00", "title": "CVE-2023-43804" } ] }
wid-sec-w-2024-2136
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "ActiveIQ Unified Manager ist eine Managementl\u00f6sung f\u00fcr NetApp Storage Produkte.\r\nData ONTAP ist das Betriebssystem von NetApp Speicherprodukten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein anonymer Remote-Angreifer kann eine Schwachstelle in verschiedenen NetApp Produkten ausnutzen, um vertrauliche Informationen offenzulegen, Daten zu manipulieren oder einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- NetApp Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-2136 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2136.json" }, { "category": "self", "summary": "WID-SEC-2024-2136 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2136" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240912-0002 vom 2024-09-12", "url": "https://security.netapp.com/advisory/ntap-20240912-0002/" } ], "source_lang": "en-US", "title": "Mehrere NetApp Produkte: Schwachstelle erm\u00f6glicht Denial of Service, Offenlegung von Informationen und Manipulation von Daten", "tracking": { "current_release_date": "2024-09-12T22:00:00.000+00:00", "generator": { "date": "2024-09-13T08:08:43.917+00:00", "engine": { "name": "BSI-WID", "version": "1.3.6" } }, "id": "WID-SEC-W-2024-2136", "initial_release_date": "2024-09-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" }, { "branches": [ { "category": "product_version_range", "name": "Mediator \u003c1.7", "product": { "name": "NetApp Data ONTAP Mediator \u003c1.7", "product_id": "T037608" } }, { "category": "product_version", "name": "Mediator 1.7", "product": { "name": "NetApp Data ONTAP Mediator 1.7", "product_id": "T037608-fixed", "product_identification_helper": { "cpe": "cpe:/a:netapp:data_ontap:mediator__1.7" } } } ], "category": "product_name", "name": "Data ONTAP" } ], "category": "vendor", "name": "NetApp" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in verschiedenen NetApp Produkten. Dieser Fehler besteht in der Komponente Certifi. Ein anonymer Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen, Daten zu manipulieren oder einen Denial-of-Service-Zustand zu erzeugen." } ], "product_status": { "known_affected": [ "T025152", "T037608", "T025631" ] }, "release_date": "2024-09-12T22:00:00.000+00:00", "title": "CVE-2023-37920" } ] }
wid-sec-w-2024-1656
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "MySQL ist ein Open Source Datenbankserver von Oracle.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1656 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1656.json" }, { "category": "self", "summary": "WID-SEC-2024-1656 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1656" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle MySQL vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6934-1 vom 2024-07-31", "url": "https://ubuntu.com/security/notices/USN-6934-1" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2024-5D9DC19F2D vom 2024-08-12", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5d9dc19f2d" }, { "category": "external", "summary": "F5 Security Advisory K000140908 vom 2024-09-03", "url": "https://my.f5.com/manage/s/article/K000140908" }, { "category": "external", "summary": "IBM Security Bulletin 7173959 vom 2024-10-23", "url": "https://www.ibm.com/support/pages/node/7173959" }, { "category": "external", "summary": "IBM Security Bulletin 7180384 vom 2025-01-07", "url": "https://www.ibm.com/support/pages/node/7180384" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240801-0001 vom 2025-06-11", "url": "https://security.netapp.com/advisory/NTAP-20240801-0001" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240731-0007 vom 2025-06-11", "url": "https://security.netapp.com/advisory/NTAP-20240731-0007" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20240731-0006 vom 2025-06-11", "url": "https://security.netapp.com/advisory/NTAP-20240731-0006" } ], "source_lang": "en-US", "title": "Oracle MySQL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-10T22:00:00.000+00:00", "generator": { "date": "2025-06-11T06:26:12.489+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-1656", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-07-31T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2024-08-11T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2024-09-03T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-06-10T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von NetApp aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "12", "product": { "name": "IBM Security Guardium 12.0", "product_id": "T031092", "product_identification_helper": { "cpe": "cpe:/a:ibm:security_guardium:12.0" } } } ], "category": "product_name", "name": "Security Guardium" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "for VMware vSphere", "product": { "name": "NetApp ActiveIQ Unified Manager for VMware vSphere", "product_id": "T025152", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere" } } }, { "category": "product_version", "name": "for Microsoft Windows", "product": { "name": "NetApp ActiveIQ Unified Manager for Microsoft Windows", "product_id": "T025631", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows" } } } ], "category": "product_name", "name": "ActiveIQ Unified Manager" } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c=8.1.0", "product": { "name": "Oracle MySQL \u003c=8.1.0", "product_id": "1502322" } }, { "category": "product_version_range", "name": "\u003c=8.1.0", "product": { "name": "Oracle MySQL \u003c=8.1.0", "product_id": "1502322-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.0.34", "product": { "name": "Oracle MySQL \u003c=8.0.34", "product_id": "1502323" } }, { "category": "product_version_range", "name": "\u003c=8.0.34", "product": { "name": "Oracle MySQL \u003c=8.0.34", "product_id": "1502323-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.0.35", "product": { "name": "Oracle MySQL \u003c=8.0.35", "product_id": "1566667" } }, { "category": "product_version_range", "name": "\u003c=8.0.35", "product": { "name": "Oracle MySQL \u003c=8.0.35", "product_id": "1566667-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.2.0", "product": { "name": "Oracle MySQL \u003c=8.2.0", "product_id": "1566668" } }, { "category": "product_version_range", "name": "\u003c=8.2.0", "product": { "name": "Oracle MySQL \u003c=8.2.0", "product_id": "1566668-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.0.36", "product": { "name": "Oracle MySQL \u003c=8.0.36", "product_id": "T032120" } }, { "category": "product_version_range", "name": "\u003c=8.0.36", "product": { "name": "Oracle MySQL \u003c=8.0.36", "product_id": "T032120-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.3.0", "product": { "name": "Oracle MySQL \u003c=8.3.0", "product_id": "T034178" } }, { "category": "product_version_range", "name": "\u003c=8.3.0", "product": { "name": "Oracle MySQL \u003c=8.3.0", "product_id": "T034178-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.0.37", "product": { "name": "Oracle MySQL \u003c=8.0.37", "product_id": "T034179" } }, { "category": "product_version_range", "name": "\u003c=8.0.37", "product": { "name": "Oracle MySQL \u003c=8.0.37", "product_id": "T034179-fixed" } }, { "category": "product_version_range", "name": "\u003c=8.4.0", "product": { "name": "Oracle MySQL \u003c=8.4.0", "product_id": "T036237" } }, { "category": "product_version_range", "name": "\u003c=8.4.0", "product": { "name": "Oracle MySQL \u003c=8.4.0", "product_id": "T036237-fixed" } }, { "category": "product_version_range", "name": "\u003c=7.5.34", "product": { "name": "Oracle MySQL \u003c=7.5.34", "product_id": "T036238" } }, { "category": "product_version_range", "name": "\u003c=7.5.34", "product": { "name": "Oracle MySQL \u003c=7.5.34", "product_id": "T036238-fixed" } }, { "category": "product_version_range", "name": "\u003c=7.6.30", "product": { "name": "Oracle MySQL \u003c=7.6.30", "product_id": "T036239" } }, { "category": "product_version_range", "name": "\u003c=7.6.30", "product": { "name": "Oracle MySQL \u003c=7.6.30", "product_id": "T036239-fixed" } }, { "category": "product_version", "name": "8.4.1", "product": { "name": "Oracle MySQL 8.4.1", "product_id": "T036240", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:8.4.1" } } }, { "category": "product_version", "name": "9.0.0", "product": { "name": "Oracle MySQL 9.0.0", "product_id": "T036241", "product_identification_helper": { "cpe": "cpe:/a:oracle:mysql:9.0.0" } } }, { "category": "product_version_range", "name": "\u003c=8.0.38", "product": { "name": "Oracle MySQL \u003c=8.0.38", "product_id": "T036274" } }, { "category": "product_version_range", "name": "\u003c=8.0.38", "product": { "name": "Oracle MySQL \u003c=8.0.38", "product_id": "T036274-fixed" } } ], "category": "product_name", "name": "MySQL" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-24112", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-24112" }, { "cve": "CVE-2023-37920", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-37920" }, { "cve": "CVE-2023-48795", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-6129", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-6129" }, { "cve": "CVE-2024-0450", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-20996", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-20996" }, { "cve": "CVE-2024-21125", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21125" }, { "cve": "CVE-2024-21127", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21127" }, { "cve": "CVE-2024-21129", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21129" }, { "cve": "CVE-2024-21130", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21130" }, { "cve": "CVE-2024-21134", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21134" }, { "cve": "CVE-2024-21135", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21135" }, { "cve": "CVE-2024-21137", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21137" }, { "cve": "CVE-2024-21142", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21142" }, { "cve": "CVE-2024-21157", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21157" }, { "cve": "CVE-2024-21159", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21159" }, { "cve": "CVE-2024-21160", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21160" }, { "cve": "CVE-2024-21162", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21162" }, { "cve": "CVE-2024-21163", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21163" }, { "cve": "CVE-2024-21165", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21165" }, { "cve": "CVE-2024-21166", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21166" }, { "cve": "CVE-2024-21170", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21170" }, { "cve": "CVE-2024-21171", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21171" }, { "cve": "CVE-2024-21173", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21173" }, { "cve": "CVE-2024-21176", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21176" }, { "cve": "CVE-2024-21177", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21177" }, { "cve": "CVE-2024-21179", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21179" }, { "cve": "CVE-2024-21185", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-21185" }, { "cve": "CVE-2024-22257", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-24549", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "product_status": { "known_affected": [ "T025152", "T028053", "T036240", "T000126", "T031092", "T025631", "T001663", "T036241", "74185" ], "last_affected": [ "1502323", "1566668", "1502322", "T036238", "T036239", "1566667", "T036237", "T036274", "T034179", "T032120", "T034178" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-25062" } ] }
wid-sec-w-2024-1642
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1642 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1642.json" }, { "category": "self", "summary": "WID-SEC-2024-1642 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1642" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2024 - Appendix Oracle Communications vom 2024-07-16", "url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixCGBU" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:6016 vom 2024-09-05", "url": "https://access.redhat.com/errata/RHSA-2024:6016" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9975 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:9975" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:9976 vom 2024-11-21", "url": "https://access.redhat.com/errata/RHSA-2024:9976" } ], "source_lang": "en-US", "title": "Oracle Communications: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-20T23:00:00.000+00:00", "generator": { "date": "2024-11-21T13:09:50.776+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1642", "initial_release_date": "2024-07-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-07-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-09-05T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-11-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "23.1.0", "product": { "name": "Oracle Communications 23.1.0", "product_id": "T027326", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.1.0" } } }, { "category": "product_version", "name": "12.6.1.0.0", "product": { "name": "Oracle Communications 12.6.1.0.0", "product_id": "T027338", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.6.1.0.0" } } }, { "category": "product_version", "name": "5.1", "product": { "name": "Oracle Communications 5.1", "product_id": "T028684", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.1" } } }, { "category": "product_version", "name": "15.0.0.0.0", "product": { "name": "Oracle Communications 15.0.0.0.0", "product_id": "T032090", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:15.0.0.0.0" } } }, { "category": "product_version", "name": "23.4.0", "product": { "name": "Oracle Communications 23.4.0", "product_id": "T032091", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.0" } } }, { "category": "product_version", "name": "23.4.1", "product": { "name": "Oracle Communications 23.4.1", "product_id": "T034143", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.1" } } }, { "category": "product_version", "name": "23.4.2", "product": { "name": "Oracle Communications 23.4.2", "product_id": "T034144", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:23.4.2" } } }, { "category": "product_version", "name": "24.1.0", "product": { "name": "Oracle Communications 24.1.0", "product_id": "T034145", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.1.0" } } }, { "category": "product_version", "name": "5.2", "product": { "name": "Oracle Communications 5.2", "product_id": "T034146", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:5.2" } } }, { "category": "product_version_range", "name": "\u003c=23.4.3", "product": { "name": "Oracle Communications \u003c=23.4.3", "product_id": "T036195" } }, { "category": "product_version_range", "name": "\u003c=23.4.3", "product": { "name": "Oracle Communications \u003c=23.4.3", "product_id": "T036195-fixed" } }, { "category": "product_version_range", "name": "\u003c=23.4.4", "product": { "name": "Oracle Communications \u003c=23.4.4", "product_id": "T036196" } }, { "category": "product_version_range", "name": "\u003c=23.4.4", "product": { "name": "Oracle Communications \u003c=23.4.4", "product_id": "T036196-fixed" } }, { "category": "product_version", "name": "24.2.0", "product": { "name": "Oracle Communications 24.2.0", "product_id": "T036197", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:24.2.0" } } }, { "category": "product_version_range", "name": "\u003c=8.6.0.8", "product": { "name": "Oracle Communications \u003c=8.6.0.8", "product_id": "T036198" } }, { "category": "product_version_range", "name": "\u003c=8.6.0.8", "product": { "name": "Oracle Communications \u003c=8.6.0.8", "product_id": "T036198-fixed" } }, { "category": "product_version", "name": "46.6.4", "product": { "name": "Oracle Communications 46.6.4", "product_id": "T036199", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:46.6.4" } } }, { "category": "product_version", "name": "46.6.5", "product": { "name": "Oracle Communications 46.6.5", "product_id": "T036200", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:46.6.5" } } }, { "category": "product_version", "name": "12.11.3", "product": { "name": "Oracle Communications 12.11.3", "product_id": "T036201", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.3" } } }, { "category": "product_version", "name": "12.11.4", "product": { "name": "Oracle Communications 12.11.4", "product_id": "T036202", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.4" } } }, { "category": "product_version_range", "name": "\u003c=8.6.0.6", "product": { "name": "Oracle Communications \u003c=8.6.0.6", "product_id": "T036203" } }, { "category": "product_version_range", "name": "\u003c=8.6.0.6", "product": { "name": "Oracle Communications \u003c=8.6.0.6", "product_id": "T036203-fixed" } }, { "category": "product_version", "name": "10.5", "product": { "name": "Oracle Communications 10.5", "product_id": "T036204", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:10.5" } } }, { "category": "product_version", "name": "4.1.0", "product": { "name": "Oracle Communications 4.1.0", "product_id": "T036205", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.1.0" } } }, { "category": "product_version", "name": "4.2.0", "product": { "name": "Oracle Communications 4.2.0", "product_id": "T036206", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:4.2.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "Oracle Communications 9.2.0", "product_id": "T036207", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "Oracle Communications 9.3.0", "product_id": "T036208", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:9.3.0" } } }, { "category": "product_version", "name": "12.11.0", "product": { "name": "Oracle Communications 12.11.0", "product_id": "T036209", "product_identification_helper": { "cpe": "cpe:/a:oracle:communications:12.11.0" } } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210" } }, { "category": "product_version_range", "name": "\u003c=9.0.3", "product": { "name": "Oracle Communications \u003c=9.0.3", "product_id": "T036210-fixed" } } ], "category": "product_name", "name": "Communications" } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2022-48174" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-52425" }, { "cve": "CVE-2023-5685", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2023-5685" }, { "cve": "CVE-2024-0450", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-0450" }, { "cve": "CVE-2024-22019", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-29025" }, { "cve": "CVE-2024-2961", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-2961" }, { "cve": "CVE-2024-34064", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-34069" }, { "cve": "CVE-2024-6162", "notes": [ { "category": "description", "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T036209", "T036205", "67646", "T036206", "T036207", "T036208", "T034143", "T036201", "T036202", "T036204", "T036197", "T034146", "T034145", "T036199", "T034144", "T036200", "T032090", "T032091", "T027326", "T027338", "T028684" ], "last_affected": [ "T036195", "T036196", "T036203", "T036198", "T036210" ] }, "release_date": "2024-07-16T22:00:00.000+00:00", "title": "CVE-2024-6162" } ] }
rhsa-2023:7435
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7435", "url": "https://access.redhat.com/errata/RHSA-2023:7435" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7435.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:57:57+00:00", "generator": { "date": "2025-08-03T10:57:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7435", "initial_release_date": "2023-11-21T15:34:29+00:00", "revision_history": [ { "date": "2023-11-21T15:34:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-21T15:34:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:57:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.2::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.2::highavailability" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-41.el8_2.12.src", "product": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src", "product_id": "fence-agents-0:4.2.1-41.el8_2.12.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-41.el8_2.12?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-41.el8_2.12?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-41.el8_2.12?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-41.el8_2.12?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "product_id": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-41.el8_2.12?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "product_id": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-41.el8_2.12?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-41.el8_2.12?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-41.el8_2.12?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-41.el8_2.12?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-41.el8_2.12?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src" }, "product_reference": "fence-agents-0:4.2.1-41.el8_2.12.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src" }, "product_reference": "fence-agents-0:4.2.1-41.el8_2.12.src", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)", "product_id": "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src" }, "product_reference": "fence-agents-0:4.2.1-41.el8_2.12.src", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "AppStream-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src" }, "product_reference": "fence-agents-0:4.2.1-41.el8_2.12.src", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-41.el8_2.12.src as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src" }, "product_reference": "fence-agents-0:4.2.1-41.el8_2.12.src", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v. 8.2)", "product_id": "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "relates_to_product_reference": "HighAvailability-8.2.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T15:34:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T15:34:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7435" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.AUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.AUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "AppStream-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "AppStream-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "AppStream-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-lpar-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.ppc64le", "HighAvailability-8.2.0.Z.E4S:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.E4S:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.E4S:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-0:4.2.1-41.el8_2.12.src", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-all-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-aws-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-brocade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-common-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-compute-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-debugsource-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-drac5-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-emerson-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-eps-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-gce-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-hpblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ifmib-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ilo2-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipdu-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-mpath-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-redfish-0:4.2.1-41.el8_2.12.x86_64", "HighAvailability-8.2.0.Z.TUS:fence-agents-rhevm-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsa-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-rsb-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-sbd-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-scsi-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-virsh-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-41.el8_2.12.noarch", "HighAvailability-8.2.0.Z.TUS:fence-agents-wti-0:4.2.1-41.el8_2.12.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhba-2024:5691
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ca-certificates is now available for Red Hat Enterprise Linux 9.", "title": "Topic" }, { "category": "general", "text": "The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).\n\nBug Fix(es) and Enhancement(s):\n\n* Annual 2024 ca-certificates update version 2.69 from NSS 3.101.1 for Firefox 128 [rhel-9.4.z] (JIRA:RHEL-44988)\n\n* Provide ca-certificates in directory format to resolve Application performance regression in OpenSSL [rhel-9.4.z] (JIRA:RHEL-48129)\n\n* calling update-ca-trust on RHEL-9 should be supported with just about any argument [rhel-9.4.z] (JIRA:RHEL-54698)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2024:5691", "url": "https://access.redhat.com/errata/RHBA-2024:5691" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_5691.json" } ], "title": "Red Hat Bug Fix Advisory: ca-certificates bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-03T10:50:28+00:00", "generator": { "date": "2025-08-03T10:50:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHBA-2024:5691", "initial_release_date": "2024-08-21T12:01:36+00:00", "revision_history": [ { "date": "2024-08-21T12:01:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-21T12:01:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:50:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src", "product": { "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src", "product_id": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ca-certificates@2024.2.69_v8.0.303-91.4.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "product": { "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "product_id": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ca-certificates@2024.2.69_v8.0.303-91.4.el9_4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch" }, "product_reference": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src" }, "product_reference": "ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src", "relates_to_product_reference": "BaseOS-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T12:01:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2024:5691" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.noarch", "BaseOS-9.4.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-91.4.el9_4.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" } ] }
rhsa-2024:0133
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:0133", "url": "https://access.redhat.com/errata/RHSA-2024:0133" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0133.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T11:00:02+00:00", "generator": { "date": "2025-08-03T11:00:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:0133", "initial_release_date": "2024-01-10T12:07:58+00:00", "revision_history": [ { "date": "2024-01-10T12:07:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-01-10T12:07:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T11:00:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability (v. 8)", "product": { "name": "Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage (v. 8)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-121.el8_9.2.src", "product": { "name": "fence-agents-0:4.2.1-121.el8_9.2.src", "product_id": "fence-agents-0:4.2.1-121.el8_9.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-121.el8_9.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "product": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "product_id": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-121.el8_9.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-121.el8_9.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "product": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "product_id": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-121.el8_9.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-121.el8_9.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-121.el8_9.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-121.el8_9.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "product_id": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-121.el8_9.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src" }, "product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src" }, "product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 8)", "product_id": "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "HighAvailability-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-121.el8_9.2.src as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src" }, "product_reference": "fence-agents-0:4.2.1-121.el8_9.2.src", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 8)", "product_id": "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "relates_to_product_reference": "ResilientStorage-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-10T12:07:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0133" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-01-10T12:07:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:0133" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "AppStream-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "AppStream-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "AppStream-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "HighAvailability-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "HighAvailability-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-0:4.2.1-121.el8_9.2.src", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aliyun-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-all-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-amt-ws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-apc-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-aws-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-azure-arm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-bladecenter-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-brocade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-mds-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-cisco-ucs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-common-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-compute-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-debugsource-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-drac5-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eaton-snmp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-emerson-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-eps-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-gce-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-heuristics-ping-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-hpblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-powervs-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibm-vpc-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ibmblade-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ifmib-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-mp-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo-ssh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ilo2-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-intelmodular-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipdu-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-ipmilan-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-lpar-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-mpath-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-openstack-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.aarch64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.ppc64le", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.s390x", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-redfish-0:4.2.1-121.el8_9.2.x86_64", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rhevm-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsa-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-rsb-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-sbd-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-scsi-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-virsh-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-rest-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-vmware-soap-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-wti-0:4.2.1-121.el8_9.2.noarch", "ResilientStorage-8.9.0.Z.MAIN:fence-agents-zvm-0:4.2.1-121.el8_9.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:7528
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7528", "url": "https://access.redhat.com/errata/RHSA-2023:7528" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7528.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:57:25+00:00", "generator": { "date": "2025-08-03T10:57:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7528", "initial_release_date": "2023-11-28T15:39:44+00:00", "revision_history": [ { "date": "2023-11-28T15:39:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-28T15:39:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:57:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-112.el8_8.2.src", "product": { "name": "fence-agents-0:4.2.1-112.el8_8.2.src", "product_id": "fence-agents-0:4.2.1-112.el8_8.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "product": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-112.el8_8.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "product": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-112.el8_8.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "product_id": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-112.el8_8.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src" }, "product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src" }, "product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.8)", "product_id": "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "HighAvailability-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-112.el8_8.2.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src" }, "product_reference": "fence-agents-0:4.2.1-112.el8_8.2.src", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.8)", "product_id": "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "relates_to_product_reference": "ResilientStorage-8.8.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-28T15:39:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7528" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-28T15:39:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7528" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "AppStream-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "AppStream-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "AppStream-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "HighAvailability-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "HighAvailability-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "HighAvailability-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-0:4.2.1-112.el8_8.2.src", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-all-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-aws-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-brocade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-common-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-compute-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-debugsource-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-drac5-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-emerson-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-eps-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-gce-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-hpblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ifmib-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ilo2-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipdu-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-lpar-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-mpath-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-openstack-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.aarch64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.ppc64le", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.s390x", "ResilientStorage-8.8.0.Z.EUS:fence-agents-redfish-0:4.2.1-112.el8_8.2.x86_64", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rhevm-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsa-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-rsb-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-sbd-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-scsi-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-virsh-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-wti-0:4.2.1-112.el8_8.2.noarch", "ResilientStorage-8.8.0.Z.EUS:fence-agents-zvm-0:4.2.1-112.el8_8.2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:7753
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7753", "url": "https://access.redhat.com/errata/RHSA-2023:7753" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7753.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:59:44+00:00", "generator": { "date": "2025-08-03T10:59:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7753", "initial_release_date": "2023-12-12T17:25:56+00:00", "revision_history": [ { "date": "2023-12-12T17:25:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-12-12T17:25:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:59:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability (v. 9)", "product": { "name": "Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage (v. 9)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.10.0-55.el9_3.2.src", "product": { "name": "fence-agents-0:4.10.0-55.el9_3.2.src", "product_id": "fence-agents-0:4.10.0-55.el9_3.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.10.0-55.el9_3.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-55.el9_3.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "product": { "name": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "product_id": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-55.el9_3.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-55.el9_3.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "product": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "product_id": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-55.el9_3.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_id": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "product_id": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-55.el9_3.2?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "product": { "name": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "product_id": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-55.el9_3.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-55.el9_3.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "product": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "product_id": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-55.el9_3.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-55.el9_3.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "product": { "name": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "product_id": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-55.el9_3.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-55.el9_3.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src" }, "product_reference": "fence-agents-0:4.10.0-55.el9_3.2.src", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-55.el9_3.2.src as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src" }, "product_reference": "fence-agents-0:4.10.0-55.el9_3.2.src", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux High Availability (v. 9)", "product_id": "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "HighAvailability-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-55.el9_3.2.src as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src" }, "product_reference": "fence-agents-0:4.10.0-55.el9_3.2.src", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage (v. 9)", "product_id": "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-12-12T17:25:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7753" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-12-12T17:25:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7753" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "AppStream-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "AppStream-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "AppStream-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "AppStream-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "HighAvailability-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "HighAvailability-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "HighAvailability-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-0:4.10.0-55.el9_3.2.src", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aliyun-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-all-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-amt-ws-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-apc-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-aws-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-azure-arm-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-bladecenter-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-brocade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-mds-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-cisco-ucs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-common-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-compute-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-debugsource-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-drac5-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eaton-snmp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-emerson-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-eps-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-gce-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-heuristics-ping-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-hpblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-powervs-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibm-vpc-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ibmblade-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ifmib-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-moonshot-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-mp-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo-ssh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ilo2-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-intelmodular-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipdu-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-ipmilan-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kdump-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-kubevirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-lpar-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-mpath-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-openstack-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.aarch64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.ppc64le", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-redfish-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rhevm-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsa-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-rsb-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-sbd-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-scsi-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-virsh-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-rest-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-vmware-soap-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-wti-0:4.10.0-55.el9_3.2.noarch", "ResilientStorage-9.3.0.Z.MAIN:fence-agents-zvm-0:4.10.0-55.el9_3.2.s390x", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-cpg-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-libvirt-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-multicast-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-serial-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:fence-virtd-tcp-debuginfo-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-0:4.10.0-55.el9_3.2.x86_64", "ResilientStorage-9.3.0.Z.MAIN:ha-cloud-support-debuginfo-0:4.10.0-55.el9_3.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:7385
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7385", "url": "https://access.redhat.com/errata/RHSA-2023:7385" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7385.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:58:20+00:00", "generator": { "date": "2025-08-03T10:58:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7385", "initial_release_date": "2023-11-21T11:31:02+00:00", "revision_history": [ { "date": "2023-11-21T11:31:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-21T11:31:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:58:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.10.0-20.el9_0.10.src", "product": { "name": "fence-agents-0:4.10.0-20.el9_0.10.src", "product_id": "fence-agents-0:4.10.0-20.el9_0.10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0.10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-20.el9_0.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "product": { "name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "product_id": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-20.el9_0.10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "product": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "product_id": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "product": { "name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "product_id": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-20.el9_0.10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "product": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "product": { "name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "product_id": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-20.el9_0.10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src" }, "product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)", "product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src" }, "product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)", "product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-20.el9_0.10.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src" }, "product_reference": "fence-agents-0:4.10.0-20.el9_0.10.src", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)", "product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" }, "product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:31:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7385" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:31:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7385" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.10.src", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.aarch64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.10.noarch", "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.10.s390x", "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.10.x86_64", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.ppc64le", "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2024:8228
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.17.2 is now available with updates to packages and images that fix several bugs.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.17.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.17.2. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2024:8229\n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.17/updating/updating_a_cluster/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8228", "url": "https://access.redhat.com/errata/RHSA-2024:8228" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8228.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.17.2 security and extras update", "tracking": { "current_release_date": "2025-08-03T11:04:31+00:00", "generator": { "date": "2025-08-03T11:04:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2024:8228", "initial_release_date": "2024-10-22T21:41:33+00:00", "revision_history": [ { "date": "2024-10-22T21:41:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-22T21:41:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T11:04:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.17", "product": { "name": "Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.17::el9" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "product": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "product_id": "openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9\u0026tag=v4.17.0-202410151605.p0.g0e1a8c3.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "product": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "product_id": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gf70d138.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "product": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "product_id": "openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "product": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "product_id": "openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "product": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "product_id": "openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "product": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "product_id": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.ga76b002.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "product": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "product_id": "openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "product": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "product_id": "openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "product": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "product_id": "openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kube-compare-artifacts-rhel9\u0026tag=v4.17.0-202410160306.p0.gcbaea1d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "product": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "product_id": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9\u0026tag=v4.17.0-202410112132.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "product": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "product_id": "openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "product": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "product_id": "openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/nmstate-console-plugin-rhel9\u0026tag=v4.17.0-202410161235.p0.gef43a0f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "product": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "product_id": "openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9\u0026tag=v4.17.0-202410112132.p0.gbd39d82.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "product": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "product_id": "openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1d4d62e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "product": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "product_id": "openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity-rhel9\u0026tag=v4.17.0-202410112132.p0.g5e7e0e4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "product": { "name": "openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "product_id": "openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-helm-rhel9-operator\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "product": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "product_id": "openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel9\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9\u0026tag=v4.17.0-202410112132.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9\u0026tag=v4.17.0-202410112132.p0.g153a973.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "product_id": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ga758ea4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.gabbeb17.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g7f66ced.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1914741.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "product": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "product_id": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator\u0026tag=v4.17.0-202410161235.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "product": { "name": "openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "product_id": "openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9\u0026tag=v4.17.0-202410112132.p0.g5bedff6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "product_id": "openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "product": { "name": "openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "product_id": "openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9\u0026tag=v4.17.0-202410112132.p0.g5c9d92b.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "product": { "name": "openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "product_id": "openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gb5ff103.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "product": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "product_id": "openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9-operator\u0026tag=v4.17.0-202410151605.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.ge7acc6a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "product": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "product_id": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "product_id": "openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g0161a3a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "product_id": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410140705.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product_id": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product_id": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product": { "name": "openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product_id": "openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product_id": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9\u0026tag=v4.17.0-202410112132.p0.g9a013d5.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ge498971.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "product": { "name": "openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "product_id": "openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/pf-status-relay-rhel9\u0026tag=v4.17.0-202410112132.p0.g7b2473d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "product": { "name": "openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "product_id": "openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel9\u0026tag=v4.17.0-202410160306.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "product": { "name": "openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "product_id": "openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g27c4663.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "product": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "product_id": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9\u0026tag=v4.17.0-202410112132.p0.ge1d8f95.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "product": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "product_id": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "product": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "product_id": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e5877f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "product": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "product_id": "openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "product": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "product_id": "openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "product": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "product_id": "openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9\u0026tag=v4.17.0-202410151605.p0.g0e1a8c3.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "product": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "product_id": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gf70d138.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "product": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "product_id": "openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "product": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "product_id": "openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "product": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "product_id": "openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "product": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "product_id": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.ga76b002.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "product": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "product_id": "openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "product": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "product_id": "openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "product": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "product_id": "openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kube-compare-artifacts-rhel9\u0026tag=v4.17.0-202410160306.p0.gcbaea1d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "product": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "product_id": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9\u0026tag=v4.17.0-202410112132.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "product": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "product_id": "openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "product": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "product_id": "openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/nmstate-console-plugin-rhel9\u0026tag=v4.17.0-202410161235.p0.gef43a0f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "product": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "product_id": "openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9\u0026tag=v4.17.0-202410112132.p0.gbd39d82.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64", "product": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64", "product_id": "openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1d4d62e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "product": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "product_id": "openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity-rhel9\u0026tag=v4.17.0-202410112132.p0.g5e7e0e4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "product": { "name": "openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "product_id": "openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-rhel9-operator\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "product": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "product_id": "openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel9\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9\u0026tag=v4.17.0-202410112132.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9\u0026tag=v4.17.0-202410112132.p0.g9696583.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9\u0026tag=v4.17.0-202410112132.p0.g153a973.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "product_id": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ga758ea4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.gabbeb17.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g7f66ced.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1914741.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "product": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "product_id": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator\u0026tag=v4.17.0-202410161235.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "product": { "name": "openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "product_id": "openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9\u0026tag=v4.17.0-202410112132.p0.g5bedff6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "product_id": "openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "product": { "name": "openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "product_id": "openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9\u0026tag=v4.17.0-202410112132.p0.g5c9d92b.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "product": { "name": "openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "product_id": "openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gb5ff103.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "product": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "product_id": "openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9-operator\u0026tag=v4.17.0-202410151605.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.ge7acc6a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "product": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "product_id": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "product_id": "openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g0161a3a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "product_id": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410140705.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product_id": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product_id": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product": { "name": "openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product_id": "openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product_identification_helper": { "purl": "pkg:oci/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product_id": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9\u0026tag=v4.17.0-202410112132.p0.g9a013d5.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ge498971.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "product": { "name": "openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "product_id": "openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "product_identification_helper": { "purl": "pkg:oci/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/pf-status-relay-rhel9\u0026tag=v4.17.0-202410112132.p0.g7b2473d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "product": { "name": "openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "product_id": "openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel9\u0026tag=v4.17.0-202410160306.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "product": { "name": "openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "product_id": "openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g27c4663.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "product_id": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9\u0026tag=v4.17.0-202410112132.p0.ge1d8f95.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "product": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "product_id": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "product": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "product_id": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e5877f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "product": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "product_id": "openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "product": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "product_id": "openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "product": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "product_id": "openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-event-proxy-rhel9\u0026tag=v4.17.0-202410151605.p0.g0e1a8c3.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "product": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "product_id": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gf70d138.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "product": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "product_id": "openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "product": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "product_id": "openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "product": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "product_id": "openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "product": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "product_id": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-infiniband-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.ga76b002.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "product": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "product_id": "openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "product": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "product_id": "openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "product": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "product_id": "openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kube-compare-artifacts-rhel9\u0026tag=v4.17.0-202410160306.p0.gcbaea1d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "product": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "product_id": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9\u0026tag=v4.17.0-202410112132.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "product": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "product_id": "openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "product": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "product_id": "openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/nmstate-console-plugin-rhel9\u0026tag=v4.17.0-202410161235.p0.gef43a0f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "product": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "product_id": "openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9\u0026tag=v4.17.0-202410112132.p0.gbd39d82.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "product": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "product_id": "openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1d4d62e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "product": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "product_id": "openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity-rhel9\u0026tag=v4.17.0-202410112132.p0.g5e7e0e4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "product": { "name": "openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "product_id": "openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-helm-rhel9-operator\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "product": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "product_id": "openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel9\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9\u0026tag=v4.17.0-202410112132.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-container-rhel9\u0026tag=v4.17.0-202410112132.p0.g9696583.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "product": { "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "product_id": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-efs-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9\u0026tag=v4.17.0-202410112132.p0.g153a973.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "product_id": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ga758ea4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.gabbeb17.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g7f66ced.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "product": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "product_id": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-filestore-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1914741.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "product": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "product_id": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator\u0026tag=v4.17.0-202410161235.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "product": { "name": "openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "product_id": "openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9\u0026tag=v4.17.0-202410112132.p0.g5bedff6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "product_id": "openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "product": { "name": "openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "product_id": "openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9\u0026tag=v4.17.0-202410112132.p0.g5c9d92b.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "product": { "name": "openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "product_id": "openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gb5ff103.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "product": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "product_id": "openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ptp-rhel9-operator\u0026tag=v4.17.0-202410151605.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.ge7acc6a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "product": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "product_id": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "product_id": "openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g0161a3a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "product_id": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410140705.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product_id": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product_id": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "product_identification_helper": { "purl": "pkg:oci/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/sriov-network-metrics-exporter-rhel9\u0026tag=v4.17.0-202410112132.p0.gc35d8f7.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product": { "name": "openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product_id": "openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product_identification_helper": { "purl": "pkg:oci/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product_id": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-rdma-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g530ed60.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9\u0026tag=v4.17.0-202410112132.p0.g9a013d5.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ge498971.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "product": { "name": "openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "product_id": "openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "product_identification_helper": { "purl": "pkg:oci/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/pf-status-relay-rhel9\u0026tag=v4.17.0-202410112132.p0.g7b2473d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "product": { "name": "openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "product_id": "openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "product_identification_helper": { "purl": "pkg:oci/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ptp-must-gather-rhel9\u0026tag=v4.17.0-202410160306.p0.g35307fc.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "product": { "name": "openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "product_id": "openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "product_identification_helper": { "purl": "pkg:oci/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/sriov-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g27c4663.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "product": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "product_id": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-dp-admission-controller-rhel9\u0026tag=v4.17.0-202410112132.p0.ge1d8f95.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "product": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "product_id": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-config-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "product": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "product_id": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-device-plugin-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e5877f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "product": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "product_id": "openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "product": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "product_id": "openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sriov-network-webhook-rhel9\u0026tag=v4.17.0-202410112132.p0.g40fc75e.assembly.stream.el9" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "product": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "product_id": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-nfd-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gf70d138.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "product": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "product_id": "openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-cni-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "product": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "product_id": "openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-daemon-rhel9\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "product": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "product_id": "openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-dpu-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g6e63d0a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "product": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "product_id": "openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "product": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "product_id": "openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ingress-node-firewall-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g93e8590.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "product": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "product_id": "openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kube-compare-artifacts-rhel9\u0026tag=v4.17.0-202410160306.p0.gcbaea1d.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "product": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "product_id": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-diskmaker-rhel9\u0026tag=v4.17.0-202410112132.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "product": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "product_id": "openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "product": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "product_id": "openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "product_identification_helper": { "purl": "pkg:oci/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/nmstate-console-plugin-rhel9\u0026tag=v4.17.0-202410161235.p0.gef43a0f.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "product": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "product_id": "openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-node-feature-discovery-rhel9\u0026tag=v4.17.0-202410112132.p0.gbd39d82.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "product": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "product_id": "openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ansible-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.g1d4d62e.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "product": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "product_id": "openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-capacity-rhel9\u0026tag=v4.17.0-202410112132.p0.g5e7e0e4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "product": { "name": "openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "product_id": "openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-helm-rhel9-operator\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "product": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "product_id": "openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-sdk-rhel9\u0026tag=v4.17.0-202410160636.p0.gc1bdd25.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "product": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "product_id": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kubernetes-nmstate-handler-rhel9\u0026tag=v4.17.0-202410112132.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9\u0026tag=v4.17.0-202410112132.p0.g153a973.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "product": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "product_id": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-clusterresourceoverride-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ga758ea4.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.gabbeb17.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "product": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "product_id": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "product_identification_helper": { "purl": "pkg:oci/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/kubernetes-nmstate-rhel9-operator\u0026tag=v4.17.0-202410161235.p0.g3b33041.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "product": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "product_id": "openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-local-storage-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g84b0570.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "product": { "name": "openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "product_id": "openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9\u0026tag=v4.17.0-202410112132.p0.g5c9d92b.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "product": { "name": "openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "product_id": "openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "product_identification_helper": { "purl": "pkg:oci/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/metallb-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.gb5ff103.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.ge7acc6a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "product": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "product_id": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "product": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "product_id": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-secrets-store-csi-mustgather-rhel9\u0026tag=v4.17.0-202410160306.p0.g06f3ae6.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "product_id": "openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9\u0026tag=v4.17.0-202410112132.p0.g0161a3a.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "product": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "product_id": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-smb-csi-driver-rhel9-operator\u0026tag=v4.17.0-202410140705.p0.gb6ab340.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9\u0026tag=v4.17.0-202410112132.p0.g9a013d5.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "product": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "product_id": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-vertical-pod-autoscaler-rhel9-operator\u0026tag=v4.17.0-202410112132.p0.ge498971.assembly.stream.el9" } } }, { "category": "product_version", "name": "openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "product": { "name": "openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "product_id": "openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "product_identification_helper": { "purl": "pkg:oci/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/pf-status-relay-rhel9\u0026tag=v4.17.0-202410112132.p0.g7b2473d.assembly.stream.el9" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64" }, "product_reference": "openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64" }, "product_reference": "openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x" }, "product_reference": "openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64" }, "product_reference": "openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64" }, "product_reference": "openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le" }, "product_reference": "openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x" }, "product_reference": "openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64" }, "product_reference": "openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64" }, "product_reference": "openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x" }, "product_reference": "openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le" }, "product_reference": "openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le" }, "product_reference": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64" }, "product_reference": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x" }, "product_reference": "openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le" }, "product_reference": "openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64" }, "product_reference": "openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x" }, "product_reference": "openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64" }, "product_reference": "openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le" }, "product_reference": "openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64" }, "product_reference": "openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x" }, "product_reference": "openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64" }, "product_reference": "openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64" }, "product_reference": "openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64" }, "product_reference": "openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le" }, "product_reference": "openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x" }, "product_reference": "openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le" }, "product_reference": "openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64" }, "product_reference": "openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x" }, "product_reference": "openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64" }, "product_reference": "openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64" }, "product_reference": "openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64" }, "product_reference": "openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64" }, "product_reference": "openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le" }, "product_reference": "openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64" }, "product_reference": "openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le" }, "product_reference": "openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x" }, "product_reference": "openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64" }, "product_reference": "openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x" }, "product_reference": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64" }, "product_reference": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le" }, "product_reference": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64" }, "product_reference": "openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64" }, "product_reference": "openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le" }, "product_reference": "openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x" }, "product_reference": "openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64" }, "product_reference": "openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64" }, "product_reference": "openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x" }, "product_reference": "openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64" }, "product_reference": "openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64" }, "product_reference": "openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le" }, "product_reference": "openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64" }, "product_reference": "openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le" }, "product_reference": "openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64" }, "product_reference": "openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x" }, "product_reference": "openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le" }, "product_reference": "openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x" }, "product_reference": "openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64" }, "product_reference": "openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le" }, "product_reference": "openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64" }, "product_reference": "openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x" }, "product_reference": "openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64" }, "product_reference": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x" }, "product_reference": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64" }, "product_reference": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le" }, "product_reference": "openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le" }, "product_reference": "openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64" }, "product_reference": "openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x" }, "product_reference": "openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64" }, "product_reference": "openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le" }, "product_reference": "openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64" }, "product_reference": "openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x" }, "product_reference": "openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le" }, "product_reference": "openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64" }, "product_reference": "openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64" }, "product_reference": "openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x" }, "product_reference": "openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64" }, "product_reference": "openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le" }, "product_reference": "openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le" }, "product_reference": "openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64" }, "product_reference": "openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64" }, "product_reference": "openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64" }, "product_reference": "openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64" }, "product_reference": "openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le" }, "product_reference": "openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x" }, "product_reference": "openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64" }, "product_reference": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x" }, "product_reference": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le" }, "product_reference": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64" }, "product_reference": "openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64" }, "product_reference": "openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64" }, "product_reference": "openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le" }, "product_reference": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64" }, "product_reference": "openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64" }, "product_reference": "openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64" }, "product_reference": "openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64" }, "product_reference": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64" }, "product_reference": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64" }, "product_reference": "openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64" }, "product_reference": "openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64" }, "product_reference": "openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le" }, "product_reference": "openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64" }, "product_reference": "openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64" }, "product_reference": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64" }, "product_reference": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le" }, "product_reference": "openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64" }, "product_reference": "openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le" }, "product_reference": "openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x" }, "product_reference": "openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64" }, "product_reference": "openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64" }, "product_reference": "openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le" }, "product_reference": "openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64" }, "product_reference": "openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64" }, "product_reference": "openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64" }, "product_reference": "openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64" }, "product_reference": "openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le" }, "product_reference": "openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le" }, "product_reference": "openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64" }, "product_reference": "openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64" }, "product_reference": "openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64" }, "product_reference": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64 as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64" }, "product_reference": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "relates_to_product_reference": "9Base-RHOSE-4.17" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le as a component of Red Hat OpenShift Container Platform 4.17", "product_id": "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le" }, "product_reference": "openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.17" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64" ], "known_not_affected": [ "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-22T21:41:33+00:00", "details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html", "product_ids": [ "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8228" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:06ae863e02332b048bbef101ed2fd84ad0cd6c03b94f1e12e93672fcacd0b3c1_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:0afbe7c2f34cd6e82095141e19a7260f4bc4c1ec0a68bc00a6715225c5298f74_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:5f80498ed7426ff7f5d778f3e6f9ea3a1be6d48bd8629ce415c3d45905204b1e_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9-operator@sha256:c6b756af9eda44ebe791dedc4866229a0ff76dc133a26c8e6f534f0f0483e352_s390x", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:134e7ea9f07f4e61660c8fcfc606b691621b47b03f0a859c00fae8a7407f8455_arm64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:41c554e52eaf83bab17687f832813833df6e02f59358d97c602b8359e00d443f_amd64", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:93a836eaff89ca8230b1697b92c64820641d4ecaf477c468ca55bfd7cfc486dd_ppc64le", "9Base-RHOSE-4.17:openshift4/ingress-node-firewall-rhel9@sha256:d54863be103fb9769668224edb4c4ea74c4eda0b6e64fee51349d08cc0c4866c_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:0001193fbf1d4a2c0bc7892d3c792f53e3927755b0b660becbf20a405b29fca4_arm64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:083d07c2d05873b51ed75d95fab782b8e5267eccf99be2ff0817c5b98fef5ecd_amd64", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:53651eac75f23ed61b198045eb6d5c3422c716dc81963c73ac6f2c1b296ee4bf_s390x", "9Base-RHOSE-4.17:openshift4/kube-compare-artifacts-rhel9@sha256:b3b374c43b444d8a89acea417a507fe916fa75fabb90d32f174373c97ab7afc9_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:ab75b69d03f5c903c2458355f78113b1b658baa3295c6f5ee4bfdae0ca952efe_ppc64le", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:c957dbca26526dc6871eadb26c208936b6fc18af9de8f9ce3cbfeaaddf6706db_amd64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:d58569e6c86d6e04ca54756bb66640af2c88827fa9a4fa834184b47e39e0483d_arm64", "9Base-RHOSE-4.17:openshift4/kubernetes-nmstate-rhel9-operator@sha256:e09be0c08609f0e8b683970a186e24f1b923dc65c3674c44c00b4822cd09dd39_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:0ec10eab632f2f66783230ef024836ee5611308b7185be45051b8c519e9284cb_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:18e597ba8b8ebdc1a002be96df3f6e138ccf901627acaf7268fb11e6a3464355_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:3d837746d4521c5baf07c02292d1699c4ee84c5ba4da261014dcef29bcdeca49_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9-operator@sha256:f1be007bddf0d8fa92a5dba73926b38933ca2543ad6262d78b5bbc1c54b23030_amd64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:378ce909371d4292012c317b679f8a04ee0a9a853ef6baea3ff809a02f25abc7_ppc64le", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:7f5aa02fe6d332875e500576013d83ad3b44d6176c50d5ee6e36466a704b680c_arm64", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:d4005ae1e006a89824ff637592bfbdc0ea2343d1dcb14e4c73a05fe5cbc80915_s390x", "9Base-RHOSE-4.17:openshift4/metallb-rhel9@sha256:ef6a91e16904017c9ba8ec7b562f9007998ed94242850fa3f1d9d78661bd919c_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:0574cf2f548fa71cd032bd7371c950bd44c6d910d3a20f2cc9f5641e53ca8d26_arm64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6a063ce5283de472c828d3000ab2ad071faf538cafd95a7d2f850ff4664b07af_amd64", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:6b7801e36be7af548faca6d8e83c9b6ca79111530edd24c473e3d59507095883_ppc64le", "9Base-RHOSE-4.17:openshift4/nmstate-console-plugin-rhel9@sha256:75c2fb6d09e6e209572c40b173c7ac6c4d8807033524d58ccffc0251d60a4416_s390x", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:4d3a96503af3600f7fc08a942c4112a4c1080a2d253465cc706a6f2482e9e690_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:acf25834f4de3957b370f0b21e2c44b596420b00c0833ae7bf2a3cd4a1e804ce_arm64", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:cf5b555d701ae3bc3a513276080f3ee8f2badcbf5cacb34c5383a2eb40e835dd_s390x", "9Base-RHOSE-4.17:openshift4/ose-ansible-rhel9-operator@sha256:f70e5d4f597c49e8a32d11c4d4f1c2c61d4cd24a08429851b3c7c196ec075a44_amd64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:679844c5bc9f075ecff0a1229680b69683e33b179b4cc4cb67ee7ec0f97195d5_amd64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-container-rhel9@sha256:9b4fe50b0ec829a1dc51588344eec8a3bda30a1ddd250178b0ffa267ae08b740_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:68e0b0251874e386d6913c4a32e9ac1eb7d60db71c4b8db42e4374763211876a_arm64", "9Base-RHOSE-4.17:openshift4/ose-aws-efs-csi-driver-rhel9-operator@sha256:fec54df16a32ee46be6ab9df6dfe4196078c0e8ffe6769c2b2f6138c9bf533b9_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:4438e7e0741736efa409a0bd37d20cd7d3fe4a3bb9161295a9e753b29d851a00_arm64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:a94a33f2ebeb26aa8389e81295ad8d202c9ddab7de00e9fa7a83b982a2aae457_amd64", "9Base-RHOSE-4.17:openshift4/ose-cloud-event-proxy-rhel9@sha256:bc59c5fb6e9f44b155c40f4e1ec25a7d884b550d1007252ea75341dee79d7c9f_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:031d6be41be7710a81cbecfa1137894691382cebda153b133322ca4cc709d434_arm64", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:5ae35a86037f3530a13c4872c377aa299fe585c2fa4a17cc0dc702847476ad60_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:eed96c5d49030347fd1846692fb1ef21cb4eba3f33bb4e066c13fbc59ea0cbae_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-capacity-rhel9@sha256:f806e77dd27bdf805fff22d2bfac6cfd5d7b5a1541c6e72147d19016e99167f6_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:0b0ba14b2ab21ce421e4d9bee5c3b206208cfb0c032fb59a07870120167ebb89_s390x", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:4681598d1ede8b22912980e793aadf32aa940d189a2faea806479c5dccfc3d5f_amd64", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6931a8cf3bb2391ca80e576b2c0084bfe42c0b990b9b6e5c6924f7311e079a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-cluster-nfd-rhel9-operator@sha256:9d6fbcf4631fa6932e5ed211cb590106802e984e853b690585924acdb2c38a12_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:1400b2695174d41c2aa9ffa918b6e94ea2bdae3fc106680cb747223563b7c260_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:48a93aa499a7e8a2d2ee7c95611422b67db8bb8e22043aa7178af2461dd76186_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:a0b043faff81dfc72f2a4bc4f66630ce56c62b10426217ed56d811158c8ff8ca_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9-operator@sha256:f15aebd44574a99f071c67eff5da47ac416831717abe30ea5ab85d33a918372e_arm64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:16dd81ed4b77e50b073d814284ceda9abd6921928b28d36da9fdfab5425e9db5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:58981b04a3808943c327caa99cd5ffb19e60b74874486267c12b432fbabd05f0_s390x", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:8938a9cb1b4c0724e9ac01a941f0ea34a5289eae5ae86283c158e7a15677a015_amd64", "9Base-RHOSE-4.17:openshift4/ose-clusterresourceoverride-rhel9@sha256:fc5a33b1abe63188b7d2b041fb5891dcde01a730ff6271e11c752bb36eed00c7_arm64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:6c45d498a05ae5dcd00adcc1ddb472626e7337ad91484eb48125852e8de1696a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:82b6676dc9cb59b41c2a8999c02eec5a18e4e5cdd7cfa7d03bf129a5252be604_s390x", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:9650db9c274ec58c42323f00a5ef885631b73bd6e874bf1e407f9d9fca09c38d_amd64", "9Base-RHOSE-4.17:openshift4/ose-csi-driver-shared-resource-mustgather-rhel9@sha256:f7a6e1cbe4cc317e866b36c935576fdb7def640aa322d0e04520b1a4df3eac17_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:10e4724ad968f96150fcc9170e30a58081d3d521018429a3b387ce66ca42bf26_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:42dac2c4b85ac7d273427f66be10f2477fcc6ca7249e71ba3f81f19339065be2_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:c7f03660c8e5066429f129b05e5c124c26d2e45f1d1f6a2d585572b326198ac3_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-cni-rhel9@sha256:db88df2b723a9a7191c48a8cd7e1e239561f7f2f986e75662024b7a392e57e9b_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:2738a3ce3cb3e391e195948efb6a4645e9dbb0beee5bd409aa65ae3eddf4d6ef_s390x", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:4172109ff4a767eb466751e5561830b63e287024d0405f71a83e5fd0bdbb2be7_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:75195228f1c371eb5c3205f742f9bf4827d229a3ce6b9084658fed39278db0b0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-daemon-rhel9@sha256:d8d4960ee748db2ebbbe9017f555d86f977d0dd67ba411e7a63259afd25ea87b_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:11426929c7e07d3b99c64e701344edb6bd1c80cac7ce000efd2ab5e296b87773_arm64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:2a242827e01be0dddff2204b91ef3d5e16a6c6b1ec8f54914cd0863db5afa82d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:400db297d9ec7deec388558a4f2ee6d5f95e696ce1889aa2ccb8e5d1896d16e0_amd64", "9Base-RHOSE-4.17:openshift4/ose-dpu-rhel9-operator@sha256:f6815315b07f4839eb96d862db8ba2bb62bb9f387c08366e3bf11e7035cd2e18_s390x", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:11032c871db59d3d652d7818419c4ef785b71b873ea9309509973731678f5f43_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:3602bbd9ebf5882992a6029e67f384a8565348493b5a8f1520996157b791f9ac_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9-operator@sha256:b47cea382c9d72045bff1de9876b56cfe86331a48c8603c4ad54725bad5a8748_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:72cc5f02ed0ec2b64ad7da9c221ee16703ddc06c9cf892bfa7c5de8bf80dc961_arm64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:8dc4651029c8b1cbe8c5060c8f24f884da4ab66c06aa8b231fff13ff2bd89f24_amd64", "9Base-RHOSE-4.17:openshift4/ose-gcp-filestore-csi-driver-rhel9@sha256:a208386646ac7b20cec27e97a3f42bf7f04bf61ed87b58a2756f7c6195c26725_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:03b1bb5436ab0fbe67d1cf82833fdd5a1d1d47c4f7108cec95aa3afdf9f2536f_s390x", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:9c2d0d94db69bdf7062e0d4d56c66d64db15dee66b0e96a005a655ff9bb12deb_amd64", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:bcb0414571fd9495c5672111bc6414741ec702b82af56dcaf5ec57f038838c40_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-helm-rhel9-operator@sha256:d2f1b49a03994a783575c7f35dcceb62f9090e1c198dc39c99c27b92395899ff_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:3fcc31aea4f03ab853f7112b7278c3391278e1c872b27c61ed393456b8d6fd91_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:616644f9c7f8d81ffa65948c1527f97a1c46a3f78bc1a5c47050e74069e2339e_amd64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:dd60469322dc287d9db48cca06891ea134d93abc1812e4ddb8319a144d449726_arm64", "9Base-RHOSE-4.17:openshift4/ose-kubernetes-nmstate-handler-rhel9@sha256:f23a76ca35a44ed226e4bbf6ea76901a04fb12e49102852d522c69668f394b89_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:2cdbfedc9838e0bf84e4683983e6439b83938bc0a4507c69417609cf09b1631d_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:a32856c291cac9b21fa412c9071dd9c6ca3fc2e0fa12db8617654d26c2422a5e_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:d8925ad82e4646fd643658f9ec632c99a7c5a5fbfd047c8ed913def368e5c414_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-diskmaker-rhel9@sha256:e29876960a3c3888794ab1a7115ebf3f6034a81153c3345064caa83b01eca188_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:36983d2407a7aabb00166fff8a8e96c540016667bc03c9805cd52305eff1b898_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:41154bda0868c034d0eef6cdebc401c873edccc2e4433b1e1543a91e44e840c1_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:6fdd8917aa17fdb3f8e0c2d4e247ede3875bd7a7bdd1c9fce948623bf7a8bd14_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-mustgather-rhel9@sha256:cbf9fb3a24e77f02e482558a30aee8ee04478caebe29b92dd69abed9b2cbf78d_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:2dee958a267a3ed2bdd859af9dfae9a6811c130a6548c833f2634a2022a4985b_arm64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:53db1bb8dd3376e04aaa4d2928d9e7012e6c07b32f4d49dd9c578d7ad1646146_s390x", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:5c1598906ea3234db1c528c27a21585b0419531ba653164a5a7921ff0141d004_amd64", "9Base-RHOSE-4.17:openshift4/ose-local-storage-rhel9-operator@sha256:d8f1062747020da1df0333f5b6d213a2f047a2ed3d13b0b1c10d9d23e021c01e_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:037343b175f9e176cb2b69dd732cd625e5b1c7d208626473270bfb6f322d662c_amd64", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:08f20170cdcb31db36157c8c389a36c977605fe63e08067588a474e2455694ec_s390x", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8bc9a40519f184b21e82cc35280026ee9437b9e8fc1d830dac71224f5a3e568a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-node-feature-discovery-rhel9@sha256:8d775762e1b777d62ee08d4453f40a89d5ca39768cedc77a60fc04168e03a7dd_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:09648f59523a73e4135fe92a965c9fef1f691bc5aa254274450b3f773519a783_arm64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:2c8ea71ac4dd0e79faad8b3a04b520b95c7a7b28f760055c1156cee23f76acaf_s390x", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:5f096fa05969da7c70255eb923b187527c4c987ff9b15cba05fbc296f9f0485e_amd64", "9Base-RHOSE-4.17:openshift4/ose-operator-sdk-rhel9@sha256:a4843ad544af9d69a36683c367e515b17164a97bd7782e6aa090cec64faeadaf_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:7c649f586eb667c7b7df918dd2e8a636d758a003f4b09e6ba92b0024f0985605_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:81d39177f1c6124a557dc365b87e97c6d35e08d5a806c15398f36def00b5ad74_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9-operator@sha256:88633ec6b389771fc723f55182c34455cc4f7be1947fc7de692e77afc3f9c64b_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:90197e784fef5cccef0ded5e62c192df66be536bed16a95bcb604d07ea9dee30_amd64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:e041f6f87e3d4ad4bb13ea7dfe3c65ebef6e1e73f2738ca2c670f6f00ab165b1_arm64", "9Base-RHOSE-4.17:openshift4/ose-ptp-rhel9@sha256:fb12127fc8d5f189a07e0a04bd57d09bcee2d0931d396a111cbe6c1abeab54fb_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:0740a10eea2882bc7544cdf9aec931bcef8dd27aee98d1c026dd30e933322fd9_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:435e415926f54ceb73862f803dce6482a844bd6948eac3fa31f44fbc098fb193_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:b112bfe2952977d9736e95eb6ca06622f70103a9ef58c33aa83ea3c449e046a2_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9-operator@sha256:cc64dafb4b9ef27c487ca4cf845c20bbce6566381e9a2d43dae1f488048286a8_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:1f71212c84f284c0022f35ab189cbf9f6d567eeaa363b88457fd4570ec30d654_arm64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:234a0d51fddc5a07ba2990f3cd45fe90e0dc1d965d88493c35a550c57ecb6ad0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:3b727fe839fc29278d382da17f778276ffd797e0f2118af1e39d02fe98e61da7_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-driver-rhel9@sha256:d2d0bcd2e532be58c7729bf2869a5c6bf6761fc1df53fe08ab0237baf8bea3ed_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:186a93055e187e3ac3f47d81194e5082d9a3c8e785e8ec06a7f7af07c41cf10b_amd64", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:257b3ba19e04bd7b642bbbd2ec9ec0b2939f0a8b1a2c32dbb0903612282fed61_s390x", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:4069cb6b269fb82f5b0beec70feac937c5d018b555a7a819854150c0e8af0ec0_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-secrets-store-csi-mustgather-rhel9@sha256:7dfb36843d93076086785415233b181e2c91a9666494df480159cd2085361f1c_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:134cd83407be5cc15ca20fd2716db834d208f3591e05829ca57f247060da2ed9_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:89d49cab01bb5e1cadc58215d357a2c771fe9d5e65dff9abb3c8a726995f6d56_amd64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:c8eaf7b8858f657041eb077229b8469446742c8f4b662655aff45b6c76fed920_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9-operator@sha256:d743db3576df08e852b02f433fb172bf61bff8ef1fdf305f080c7d94f12e12d7_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:086f523f32c3b2e4e2c7924bd1cdf98ff58a41816ebcd47db853fe22ef07823f_arm64", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:80b4a844622e9d1cfdcb41df428552f536ecf99a1ee720f6203ce78a32ffd577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:c21420ebbff72f0233cfa8c34f3d187f5639efdb20558983cedb9b7d98134c8a_s390x", "9Base-RHOSE-4.17:openshift4/ose-smb-csi-driver-rhel9@sha256:f3f546a97e7a79bb3acc9a545275d3fa7ecc6804e861c65893e6ea17fcffe3d1_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:3bf775b4921483f328c7ad7fbfca248cf8fcbedbe8a1d48213ee4aaa152b717b_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:63613745e23719e1369ddff92d19f847d667f7b52cf89866f097c9d05738cb83_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-dp-admission-controller-rhel9@sha256:b14f1050ba8e6bdd33e19576c38dbb8beb5bb54ea918c9b8b75006324c5f842c_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:0954d6a95dd182460640fc04dd2ed8786c211b16e86e8ca286cc4336b88ac554_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:537f7cd652a591d3480a7cee3ebc12b77f1163d093768fc0b10f64c26736e9c5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-infiniband-cni-rhel9@sha256:dcc3778127ebb2d076273a654c6ebc3cf54a15da225b36385ac56742c441cedc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:354ff1483aaa5006bab6f50f16f01d42db5a528e7a1d625d7097baae5030cba5_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:47d64afaedaf8d8f63a4b946cae4f71296dd0a392d0fdf426f7fabb787c8f692_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-config-daemon-rhel9@sha256:e0e48ff548f9e0e300a891ceb60ecbdda3cdbac61acf3c9765847b4e5655f27f_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:4f47c5be44fe57dc7b06e7b71bacbec11d2ec8ff6a18948863cade5674991d80_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:5807a6d446232c8ae3d166e13252389c22af53af0b52ce30cf02624e6b6326fd_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-device-plugin-rhel9@sha256:a61b5512cce5b3910064f3bcafff40839def9b97c6d13fdef155874409ce7497_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:441d56720500ad5fe7b09da31dcf3fb8aa9cfa5252bbb6a1f4b8eb20154ac577_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:86fa1fe2064ba4d9661b759ac879dc26443c57fcfc3c2dc5259991b3e0102045_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-rhel9-operator@sha256:b1774091a4c95b5bfd860c66987d1d20d3b2b693cef05534fc04138621a816cf_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:8a3c252c00ffb4c5e0916893d8e3769438d88ba938ec202506b46545fa3be476_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:9bca393953d3555d4acdce11e9c3ce05df39b326c8c4d5e8e59604b7e53dfbe4_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-sriov-network-webhook-rhel9@sha256:ce50ce4cd49a4a1e34d9dcb0b32162d7c8b1191acff364403f812c2b1c4bd3fb_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/ose-sriov-rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:7e90f1e57a2e17d6e3b0e8a94412ebbf5cef289c66b26ba9f97fc91e50329d15_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:d2d3c804832367b9c085459179e1879dc1de61ac4cd40f2703d2554a462d7043_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:e4fdcaabd887a67dbd11742d0babb1e252ea13e5872d32e2f528144e6ba63236_amd64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9-operator@sha256:ffe79eb36ab0993fc7ba4daa747ba808d5cb09765e0333d11566467b95a290a4_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:70a8b777c3284ca568a501e413d323559fed965a991d27369e0fd25a69d72bea_ppc64le", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:a43a3c0b9345bb1095387147268ac91bda4512b0894e040624f5badeda61e37f_arm64", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:b991f6c903d7c5a804c3868282591ed583a69e8b8a1506ff3a5f8bc49dfcce04_s390x", "9Base-RHOSE-4.17:openshift4/ose-vertical-pod-autoscaler-rhel9@sha256:d8d880be36fbf5c771e9c4f3f665abf5ee600e810dd2e0965b66b23761d84b9e_amd64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:00965baf0688c01b95c8a326ee5555ab9e3311bb8584099f3fd18e197c7c7c6b_ppc64le", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:157f42a3d75f6d7f4c7a040c7ceaebd6d7ca1c3ab6bb59d063ab5f2e2cb7d65e_s390x", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:5b734856c4aa85c5f905d99b7baa86f9fdac4ee5f61c28347cc8c5650359e7a8_arm64", "9Base-RHOSE-4.17:openshift4/pf-status-relay-rhel9@sha256:aa6bd342bc5955dc3464676d63db205dcbe384f92f35b65874369ded877ad3c2_amd64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:602f15cb9b2ba7d9c6c9a9fa3675f4380b46602f7c40355eb4340a0e470069cc_ppc64le", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:7245f301d153f45971b2004428cff98df8a775b6a6f5bb793ff45d1607634a71_arm64", "9Base-RHOSE-4.17:openshift4/ptp-must-gather-rhel9@sha256:fbfbad5fbe6f0fb9600457fa277080b83ee85ccad53188e35842a28a4f7b1add_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:2c52e84c72f277689df0506977f8f37b62509a7bad430ee9a54bdfb7f980ba13_amd64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:5c243880537f490c0c7ed52222a65e98c8b4dba73ad2ab929ed94aa78fb237fc_arm64", "9Base-RHOSE-4.17:openshift4/rdma-cni-rhel9@sha256:99891617910f654252d2623e03d8a6d4efe93f45bcdc8adb16602b0c6263183a_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:5d916ecf71e3cdfc5626cdea37aa6fe552db24ace7732e6a77f7b488128aec60_ppc64le", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:76254608762a71bf1ae2afd5e1bbfee351b0549909a2c38e23272d9e2828c69c_arm64", "9Base-RHOSE-4.17:openshift4/sriov-cni-rhel9@sha256:b4aa6d08c080e19b8df0db26e9fb23e3a843bb52d536ccee01892a866dced6d8_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:17e40eb386cfd568ef642fbc49d813247efc97e5213c888a9d1ce7b955ed5973_amd64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:2f1a041c2cbccd148903470a43eedd07c5c6cda029be8519c1aacc4bbbdf3f2d_arm64", "9Base-RHOSE-4.17:openshift4/sriov-network-metrics-exporter-rhel9@sha256:daf4a9b94646e71ab8e1f6ff4bb3147a01f328bad86fc5502801c31f1b4763aa_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" } ] }
rhsa-2023:7523
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7523", "url": "https://access.redhat.com/errata/RHSA-2023:7523" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7523.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:57:45+00:00", "generator": { "date": "2025-08-03T10:57:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7523", "initial_release_date": "2023-11-28T15:32:41+00:00", "revision_history": [ { "date": "2023-11-28T15:32:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-28T15:32:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:57:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::highavailability" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-65.el8_4.13.src", "product": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src", "product_id": "fence-agents-0:4.2.1-65.el8_4.13.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4.13?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-65.el8_4.13?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-65.el8_4.13?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "product": { "name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "product_id": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-65.el8_4.13?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.13?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.13?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src" }, "product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src" }, "product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src" }, "product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src" }, "product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability E4S (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-65.el8_4.13.src as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src" }, "product_reference": "fence-agents-0:4.2.1-65.el8_4.13.src", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64 as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch as a component of Red Hat Enterprise Linux HighAvailability TUS (v.8.4)", "product_id": "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "relates_to_product_reference": "HighAvailability-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-28T15:32:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7523" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-28T15:32:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7523" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "AppStream-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "AppStream-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "AppStream-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.aarch64", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.ppc64le", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.s390x", "HighAvailability-8.4.0.Z.E4S:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.E4S:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.E4S:fence-agents-zvm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-0:4.2.1-65.el8_4.13.src", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-all-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-aws-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-brocade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-common-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-compute-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-debugsource-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-drac5-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-emerson-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-eps-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-gce-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-hpblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ifmib-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ilo2-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipdu-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-lpar-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-mpath-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-redfish-0:4.2.1-65.el8_4.13.x86_64", "HighAvailability-8.4.0.Z.TUS:fence-agents-rhevm-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsa-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-rsb-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-sbd-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-scsi-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-virsh-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.13.noarch", "HighAvailability-8.4.0.Z.TUS:fence-agents-wti-0:4.2.1-65.el8_4.13.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:6812
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.\n\nBug Fix(es) and Enhancement(s):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:6812", "url": "https://access.redhat.com/errata/RHSA-2023:6812" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6812.json" } ], "title": "Red Hat Security Advisory: fence-agents bug fix, enhancement, and security update", "tracking": { "current_release_date": "2025-08-03T10:56:20+00:00", "generator": { "date": "2025-08-03T10:56:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:6812", "initial_release_date": "2023-11-08T11:03:18+00:00", "revision_history": [ { "date": "2023-11-08T11:03:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-08T11:03:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:56:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.1::highavailability" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-30.el8_1.10.src", "product": { "name": "fence-agents-0:4.2.1-30.el8_1.10.src", "product_id": "fence-agents-0:4.2.1-30.el8_1.10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-30.el8_1.10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "product_id": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-30.el8_1.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-30.el8_1.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-30.el8_1.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-30.el8_1.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-30.el8_1.10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-30.el8_1.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-30.el8_1.10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-30.el8_1.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "product_id": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-30.el8_1.10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-30.el8_1.10.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src" }, "product_reference": "fence-agents-0:4.2.1-30.el8_1.10.src", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.1)", "product_id": "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "AppStream-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-30.el8_1.10.src as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src" }, "product_reference": "fence-agents-0:4.2.1-30.el8_1.10.src", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v. 8.1)", "product_id": "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "relates_to_product_reference": "HighAvailability-8.1.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-08T11:03:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:6812" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-08T11:03:18+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:6812" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "AppStream-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "AppStream-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "AppStream-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-0:4.2.1-30.el8_1.10.src", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-all-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-aws-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-brocade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-common-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-compute-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-debugsource-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-drac5-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-emerson-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-eps-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-gce-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-hpblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ifmib-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ilo2-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipdu-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-lpar-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-mpath-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.ppc64le", "HighAvailability-8.1.0.Z.E4S:fence-agents-redfish-0:4.2.1-30.el8_1.10.x86_64", "HighAvailability-8.1.0.Z.E4S:fence-agents-rhevm-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsa-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-rsb-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-sbd-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-scsi-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-virsh-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-30.el8_1.10.noarch", "HighAvailability-8.1.0.Z.E4S:fence-agents-wti-0:4.2.1-30.el8_1.10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:7378
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7378", "url": "https://access.redhat.com/errata/RHSA-2023:7378" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7378.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:58:09+00:00", "generator": { "date": "2025-08-03T10:58:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7378", "initial_release_date": "2023-11-21T11:23:51+00:00", "revision_history": [ { "date": "2023-11-21T11:23:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-21T11:23:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:58:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.2::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "product_id": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_id": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virt@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-43.el9_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "product": { "name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "product_id": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-43.el9_2.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-43.el9_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-43.el9_2.2?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "product": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "product_id": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-43.el9_2.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-43.el9_2.2?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "product": { "name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "product_id": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-43.el9_2.2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.10.0-43.el9_2.2.src", "product": { "name": "fence-agents-0:4.10.0-43.el9_2.2.src", "product_id": "fence-agents-0:4.10.0-43.el9_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.10.0-43.el9_2.2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src" }, "product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)", "product_id": "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src" }, "product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.2)", "product_id": "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "HighAvailability-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.10.0-43.el9_2.2.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src" }, "product_reference": "fence-agents-0:4.10.0-43.el9_2.2.src", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch" }, "product_reference": "fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x" }, "product_reference": "fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.2)", "product_id": "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" }, "product_reference": "ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "relates_to_product_reference": "ResilientStorage-9.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:23:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7378" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:23:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7378" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "AppStream-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "AppStream-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "AppStream-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "AppStream-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "HighAvailability-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "HighAvailability-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "HighAvailability-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "HighAvailability-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-0:4.10.0-43.el9_2.2.src", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aliyun-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-all-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-aws-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-brocade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-common-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-compute-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-debugsource-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-drac5-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-emerson-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-eps-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-gce-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-hpblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ifmib-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ilo2-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipdu-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-lpar-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-mpath-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-openstack-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.aarch64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.ppc64le", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-agents-redfish-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rhevm-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsa-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-rsb-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-sbd-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-scsi-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-virsh-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-wti-0:4.10.0-43.el9_2.2.noarch", "ResilientStorage-9.2.0.Z.EUS:fence-agents-zvm-0:4.10.0-43.el9_2.2.s390x", "ResilientStorage-9.2.0.Z.EUS:fence-virt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-0:4.10.0-43.el9_2.2.x86_64", "ResilientStorage-9.2.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-43.el9_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhsa-2023:7407
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* python-certifi: Removal of e-Tugra root certificate (CVE-2023-37920)\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7407", "url": "https://access.redhat.com/errata/RHSA-2023:7407" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7407.json" } ], "title": "Red Hat Security Advisory: fence-agents security update", "tracking": { "current_release_date": "2025-08-03T10:57:45+00:00", "generator": { "date": "2025-08-03T10:57:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2023:7407", "initial_release_date": "2023-11-21T11:39:13+00:00", "revision_history": [ { "date": "2023-11-21T11:39:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-11-21T11:39:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:57:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::highavailability" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::resilientstorage" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.10?arch=x86_64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "product": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-89.el8_6.10?arch=noarch" } } }, { "category": "product_version", "name": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "product": { "name": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "product_id": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-89.el8_6.10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "fence-agents-0:4.2.1-89.el8_6.10.src", "product": { "name": "fence-agents-0:4.2.1-89.el8_6.10.src", "product_id": "fence-agents-0:4.2.1-89.el8_6.10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents@4.2.1-89.el8_6.10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.10?arch=aarch64" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.10?arch=ppc64le" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.10?arch=s390x" } } }, { "category": "product_version", "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-89.el8_6.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src" }, "product_reference": "fence-agents-0:4.2.1-89.el8_6.10.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-89.el8_6.10.src as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src" }, "product_reference": "fence-agents-0:4.2.1-89.el8_6.10.src", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.8.6)", "product_id": "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "HighAvailability-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-0:4.2.1-89.el8_6.10.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src" }, "product_reference": "fence-agents-0:4.2.1-89.el8_6.10.src", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64" }, "product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.8.6)", "product_id": "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" }, "product_reference": "fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "relates_to_product_reference": "ResilientStorage-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:39:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" }, { "cve": "CVE-2023-43804", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2242493" } ], "notes": [ { "category": "description", "text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-43804" }, { "category": "external", "summary": "RHBZ#2242493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804" } ], "release_date": "2023-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-11-21T11:39:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7407" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "AppStream-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "AppStream-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "AppStream-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "HighAvailability-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "HighAvailability-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "HighAvailability-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-0:4.2.1-89.el8_6.10.src", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-all-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-aws-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-brocade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-common-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-compute-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-debugsource-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-drac5-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-emerson-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-eps-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-gce-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-hpblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ifmib-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ilo2-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipdu-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-lpar-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-mpath-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.aarch64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.ppc64le", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.s390x", "ResilientStorage-8.6.0.Z.EUS:fence-agents-redfish-0:4.2.1-89.el8_6.10.x86_64", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rhevm-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsa-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-rsb-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-sbd-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-scsi-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-virsh-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-wti-0:4.2.1-89.el8_6.10.noarch", "ResilientStorage-8.6.0.Z.EUS:fence-agents-zvm-0:4.2.1-89.el8_6.10.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects" } ] }
rhba-2024:5736
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ca-certificates is now available for Red Hat Enterprise Linux 8.", "title": "Topic" }, { "category": "general", "text": "The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).\n\nBug Fix(es) and Enhancement(s):\n\n* Annual 2024 ca-certificates update version 2.69 from NSS 3.101.1 for Firefox 128 [rhel-8.10] (JIRA:RHEL-44949)\n\n* ca-certificates: python-certifi: Removal of e-Tugra root certificate [rhel-8.10.0.z] (JIRA:RHEL-16194)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHBA-2024:5736", "url": "https://access.redhat.com/errata/RHBA-2024:5736" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhba-2024_5736.json" } ], "title": "Red Hat Bug Fix Advisory: ca-certificates bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-03T10:50:40+00:00", "generator": { "date": "2025-08-03T10:50:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHBA-2024:5736", "initial_release_date": "2024-08-21T17:09:42+00:00", "revision_history": [ { "date": "2024-08-21T17:09:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-08-21T17:09:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T10:50:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src", "product": { "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src", "product_id": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ca-certificates@2024.2.69_v8.0.303-80.0.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "product": { "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "product_id": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ca-certificates@2024.2.69_v8.0.303-80.0.el8_10?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch" }, "product_reference": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src" }, "product_reference": "ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src", "relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2023-07-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2226586" } ], "notes": [ { "category": "description", "text": "A flaw was found in the python-certifi package. This issue occurs when the e-Tugra root certificate in Certifi is removed, resulting in an unspecified error that has an unknown impact and attack vector.", "title": "Vulnerability description" }, { "category": "summary", "text": "python-certifi: Removal of e-Tugra root certificate", "title": "Vulnerability summary" }, { "category": "other", "text": "While eTurgra certificates being marked as untrusted by Mozilla is significant from a trust and security standpoint, this is still considered a low severity issue. The certificates were removed from Mozilla\u0027s root store in July 2023, indicating a proactive response to security concerns. Additionally, Red Hat does not run its own root store program, but depends on Mozilla for ssl certificates and Microsoft for signing certificates. \nThese certs are included and marked as don\u0027t trust and will not be removed until Mozilla removes them. Browsers are most at risk, which already understand and parse \u0027don\u0027t trust after\u0027. If python-fi is required not to trust these certs, they should parse the \u0027don\u0027t trust after\u0027 attribute.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37920" }, { "category": "external", "summary": "RHBZ#2226586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2226586" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37920", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37920" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" } ], "release_date": "2023-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-08-21T17:09:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHBA-2024:5736" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.noarch", "BaseOS-8.10.0.Z.MAIN.EUS:ca-certificates-0:2024.2.69_v8.0.303-80.0.el8_10.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "python-certifi: Removal of e-Tugra root certificate" } ] }
ncsc-2024-0294
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle Communications.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Incomplete Cleanup", "title": "CWE-459" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10086" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41184" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34169" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42890" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48174" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46589" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51775" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5685" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22019" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22201" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22234" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23672" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23807" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23897" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25710" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26130" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26308" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27316" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28182" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28752" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28849" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-29025" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-2961" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34064" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34069" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6162" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Communications", "tracking": { "current_release_date": "2024-07-17T13:52:53.293003Z", "id": "NCSC-2024-0294", "initial_release_date": "2024-07-17T13:52:53.293003Z", "revision_history": [ { "date": "2024-07-17T13:52:53.293003Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-204629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "communications_asap", "product": { "name": "communications_asap", "product_id": "CSAFPID-816792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-10086", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2019-10086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-10086.json" } ], "title": "CVE-2019-10086" }, { "cve": "CVE-2021-29425", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-29425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-29425.json" } ], "title": "CVE-2021-29425" }, { "cve": "CVE-2021-37533", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-37533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37533.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2021-37533" }, { "cve": "CVE-2021-41184", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2021-41184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-204629", "CSAFPID-816792" ] } ], "title": "CVE-2021-41184" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-204629", "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-42890", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42890", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42890.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-42890" }, { "cve": "CVE-2022-48174", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2022-48174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-48174.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2022-48174" }, { "cve": "CVE-2023-5685", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5685", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-5685" }, { "cve": "CVE-2023-24998", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-24998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json" } ], "title": "CVE-2023-24998" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-46589", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "other", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)", "title": "CWE-444" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-46589", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-46589" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-51775", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51775", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-51775" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-6162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-6162" }, { "cve": "CVE-2024-22019", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22019.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22019" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-22234", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22234.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22234" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-23672", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "other", "text": "Incomplete Cleanup", "title": "CWE-459" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23672", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23672" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23897", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23897.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-23897" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25062" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27316", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27316.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-27316" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28752", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28752", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28752.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28752" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-34064", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34064" }, { "cve": "CVE-2024-34069", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "notes": [ { "category": "other", "text": "Cross-Site Request Forgery (CSRF)", "title": "CWE-352" } ], "product_status": { "known_affected": [ "CSAFPID-816792" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816792" ] } ], "title": "CVE-2024-34069" } ] }
ncsc-2024-0412
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in Peoplesoft.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service (DoS) te veroorzaken, of om toegang te krijgen tot (persoons)gevoelige gegevens in de database en deze mogelijk te manipuleren.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Peoplesoft", "tracking": { "current_release_date": "2024-10-17T13:16:18.175855Z", "id": "NCSC-2024-0412", "initial_release_date": "2024-10-17T13:16:18.175855Z", "revision_history": [ { "date": "2024-10-17T13:16:18.175855Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "peoplesoft", "product": { "name": "peoplesoft", "product_id": "CSAFPID-1676099", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft:8.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft", "product": { "name": "peoplesoft", "product_id": "CSAFPID-1676097", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft:8.60:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft", "product": { "name": "peoplesoft", "product_id": "CSAFPID-1676096", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft:8.61:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft", "product": { "name": "peoplesoft", "product_id": "CSAFPID-1676098", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft___9.2.50", "product": { "name": "peoplesoft___9.2.50", "product_id": "CSAFPID-1676100", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft___9.2.50:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_cc_common_application_objects", "product": { "name": "peoplesoft_enterprise_cc_common_application_objects", "product_id": "CSAFPID-449779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_cc_common_application_objects:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_crm_client_management", "product": { "name": "peoplesoft_enterprise_crm_client_management", "product_id": "CSAFPID-912607", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_crm_client_management:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_elm_enterprise_learning_management", "product": { "name": "peoplesoft_enterprise_elm_enterprise_learning_management", "product_id": "CSAFPID-1673472", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_elm_enterprise_learning_management:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_fin_expenses", "product": { "name": "peoplesoft_enterprise_fin_expenses", "product_id": "CSAFPID-172664", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_expenses:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_benefits_administration", "product": { "name": "peoplesoft_enterprise_hcm_benefits_administration", "product_id": "CSAFPID-912052", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_benefits_administration:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673748", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673753", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673749", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673755", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.35:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.38:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.39:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.41:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.43:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673750", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.44:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.47:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673471", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.48-9.2.50:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.48:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673756", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.49:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.50:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673751", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673754", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product": { "name": "peoplesoft_enterprise_hcm_global_payroll_core", "product_id": "CSAFPID-1673790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_global_payroll_core:9.2.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_human_resources", "product": { "name": "peoplesoft_enterprise_hcm_human_resources", "product_id": "CSAFPID-172663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_human_resources:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_hcm_shared_components", "product": { "name": "peoplesoft_enterprise_hcm_shared_components", "product_id": "CSAFPID-607590", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_hcm_shared_components:9.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1682", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1681", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.60:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-816362", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.61:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503667", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503672", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.60:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503676", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_opensearch___8.61:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503669", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.59:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503673", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.60:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "peoplesoft_enterprise_peopletools", "product": { "name": "peoplesoft_enterprise_peopletools", "product_id": "CSAFPID-1503678", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:_web_server___8.61:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5752", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5752", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5752.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607" ] } ], "title": "CVE-2023-5752" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1682", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1681", "CSAFPID-1503676", "CSAFPID-1503678", "CSAFPID-816362" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1682", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1681", "CSAFPID-1503676", "CSAFPID-1503678", "CSAFPID-816362" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1682", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1681", "CSAFPID-1503676", "CSAFPID-1503678", "CSAFPID-816362" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json" } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1682", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1681", "CSAFPID-1503676", "CSAFPID-1503678", "CSAFPID-816362" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1682", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1681", "CSAFPID-1503676", "CSAFPID-1503678", "CSAFPID-816362" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-0727", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1503676", "CSAFPID-1503678" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0727", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1503676", "CSAFPID-1503678" ] } ], "title": "CVE-2024-0727" }, { "cve": "CVE-2024-21202", "product_status": { "known_affected": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21202.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21202" }, { "cve": "CVE-2024-21214", "product_status": { "known_affected": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21214", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21214.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21214" }, { "cve": "CVE-2024-21249", "product_status": { "known_affected": [ "CSAFPID-172664", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21249", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21249.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-172664", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21249" }, { "cve": "CVE-2024-21255", "product_status": { "known_affected": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21255", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21255.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816362", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21255" }, { "cve": "CVE-2024-21264", "product_status": { "known_affected": [ "CSAFPID-449779", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-449779", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21264" }, { "cve": "CVE-2024-21283", "product_status": { "known_affected": [ "CSAFPID-1673471", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21283", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21283.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673471", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21283" }, { "cve": "CVE-2024-21286", "product_status": { "known_affected": [ "CSAFPID-1673472", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21286", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21286.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673472", "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100" ] } ], "title": "CVE-2024-21286" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1503676", "CSAFPID-1503678" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1676096", "CSAFPID-1676097", "CSAFPID-1676098", "CSAFPID-1676099", "CSAFPID-1676100", "CSAFPID-1681", "CSAFPID-1682", "CSAFPID-816362", "CSAFPID-912052", "CSAFPID-912607", "CSAFPID-172663", "CSAFPID-607590", "CSAFPID-1503667", "CSAFPID-1503669", "CSAFPID-1503672", "CSAFPID-1503673", "CSAFPID-1503676", "CSAFPID-1503678" ] } ], "title": "CVE-2024-26130" } ] }
ncsc-2024-0416
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in Financial Services Applications.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Cross-Site-Scripting (XSS)\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Initialization of a Resource with an Insecure Default", "title": "CWE-1188" }, { "category": "general", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Financial Services Applications", "tracking": { "current_release_date": "2024-10-17T13:18:45.385015Z", "id": "NCSC-2024-0416", "initial_release_date": "2024-10-17T13:18:45.385015Z", "revision_history": [ { "date": "2024-10-17T13:18:45.385015Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221114", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:18.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94303", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:18.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221111", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:18.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:18.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221109", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-816813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:19.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94301", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:19.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221107", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:19.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:19.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221106", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:21.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-816814", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:21.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:21.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221103", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-816815", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94296", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-221102", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-816816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_apis", "product": { "name": "banking_apis", "product_id": "CSAFPID-94294", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_apis:22.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-764256", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-1503320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:14.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912088", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912087", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912086", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912568", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:_reports___14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:_reports___14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_branch", "product": { "name": "banking_branch", "product_id": "CSAFPID-912570", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_branch:_reports___14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-764257", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-1503613", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912091", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912090", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912089", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-220172", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.7.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-220168", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.7.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-1673521", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.7.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-1673498", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:14.7.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912571", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:_accessibility___14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912572", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:_accessibility___14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_cash_management", "product": { "name": "banking_cash_management", "product_id": "CSAFPID-912573", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_cash_management:_accessibility___14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_collections_and_recovery", "product": { "name": "banking_collections_and_recovery", "product_id": "CSAFPID-816817", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_collections_and_recovery:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending", "product": { "name": "banking_corporate_lending", "product_id": "CSAFPID-764258", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-764259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503614", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503615", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503616", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_corporate_lending_process_management", "product": { "name": "banking_corporate_lending_process_management", "product_id": "CSAFPID-1503617", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_corporate_lending_process_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_credit_facilities_process_management", "product": { "name": "banking_credit_facilities_process_management", "product_id": "CSAFPID-764260", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_credit_facilities_process_management", "product": { "name": "banking_credit_facilities_process_management", "product_id": "CSAFPID-1503618", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_credit_facilities_process_management", "product": { "name": "banking_credit_facilities_process_management", "product_id": "CSAFPID-1503619", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_credit_facilities_process_management", "product": { "name": "banking_credit_facilities_process_management", "product_id": "CSAFPID-1503620", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_credit_facilities_process_management", "product": { "name": "banking_credit_facilities_process_management", "product_id": "CSAFPID-220170", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_credit_facilities_process_management:14.7.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_deposits_and_lines_of_credit_servicing", "product": { "name": "banking_deposits_and_lines_of_credit_servicing", "product_id": "CSAFPID-912574", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.12.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_deposits_and_lines_of_credit_servicing", "product": { "name": "banking_deposits_and_lines_of_credit_servicing", "product_id": "CSAFPID-611428", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_deposits_and_lines_of_credit_servicing", "product": { "name": "banking_deposits_and_lines_of_credit_servicing", "product_id": "CSAFPID-387666", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_deposits_and_lines_of_credit_servicing:2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:18.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-9129", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:18.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:18.3.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-9569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:18.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221110", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-816818", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:19.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-9611", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:19.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221108", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:19.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-9198", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:19.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221105", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:21.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-816819", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:21.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-94298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:21.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221104", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-816820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-94297", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-221101", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-816821", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_digital_experience", "product": { "name": "banking_digital_experience", "product_id": "CSAFPID-94293", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_digital_experience:22.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_electronic_data_exchange_for_corporates", "product": { "name": "banking_electronic_data_exchange_for_corporates", "product_id": "CSAFPID-764261", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_electronic_data_exchange_for_corporates:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_enterprise_default_management", "product": { "name": "banking_enterprise_default_management", "product_id": "CSAFPID-816822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_enterprise_default_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_enterprise_default_management", "product": { "name": "banking_enterprise_default_management", "product_id": "CSAFPID-912575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_enterprise_default_management", "product": { "name": "banking_enterprise_default_management", "product_id": "CSAFPID-912576", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_extensibility_workbench", "product": { "name": "banking_extensibility_workbench", "product_id": "CSAFPID-816823", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_extensibility_workbench:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-764262", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-1673190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.5.0.12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-220156", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.5.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-764747", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.6.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-220154", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.6.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912092", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-764748", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-220152", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-816824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-1673189", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-220151", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-1673482", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-1673499", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:14.7.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912577", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:_common___14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912578", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:_common___14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912579", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:_common___14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_liquidity_management", "product": { "name": "banking_liquidity_management", "product_id": "CSAFPID-912580", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_liquidity_management:_infrastructure___14.7.0.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_loans_servicing", "product": { "name": "banking_loans_servicing", "product_id": "CSAFPID-912581", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_loans_servicing:2.12.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_loans_servicing", "product": { "name": "banking_loans_servicing", "product_id": "CSAFPID-611718", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_loans_servicing:2.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-764263", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-224806", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912062", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-258398", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-220173", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:14.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912582", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:_basic_config_maintenances___14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912583", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:_basic_config_maintenances___14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_origination", "product": { "name": "banking_origination", "product_id": "CSAFPID-912584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_origination:_basic_config_maintenances___14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_party_management", "product": { "name": "banking_party_management", "product_id": "CSAFPID-816825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_party_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_party_management", "product": { "name": "banking_party_management", "product_id": "CSAFPID-912095", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_party_management:2.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_party_management", "product": { "name": "banking_party_management", "product_id": "CSAFPID-387665", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_party_management:2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_payments", "product": { "name": "banking_payments", "product_id": "CSAFPID-764264", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_payments:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_payments", "product": { "name": "banking_payments", "product_id": "CSAFPID-94387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_payments:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_payments", "product": { "name": "banking_payments", "product_id": "CSAFPID-220552", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_payments:14.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_payments", "product": { "name": "banking_payments", "product_id": "CSAFPID-220160", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_payments:14.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-912585", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.12.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-204520", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-1503621", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-9430", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-912096", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_platform", "product": { "name": "banking_platform", "product_id": "CSAFPID-9390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_supply_chain_finance", "product": { "name": "banking_supply_chain_finance", "product_id": "CSAFPID-764265", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_supply_chain_finance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_supply_chain_finance", "product": { "name": "banking_supply_chain_finance", "product_id": "CSAFPID-220171", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.7.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_supply_chain_finance", "product": { "name": "banking_supply_chain_finance", "product_id": "CSAFPID-220169", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.7.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_supply_chain_finance", "product": { "name": "banking_supply_chain_finance", "product_id": "CSAFPID-1673520", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.7.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_supply_chain_finance", "product": { "name": "banking_supply_chain_finance", "product_id": "CSAFPID-1673500", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_supply_chain_finance:14.7.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance", "product": { "name": "banking_trade_finance", "product_id": "CSAFPID-631680", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance", "product": { "name": "banking_trade_finance", "product_id": "CSAFPID-94386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance", "product": { "name": "banking_trade_finance", "product_id": "CSAFPID-344967", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance:14.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance", "product": { "name": "banking_trade_finance", "product_id": "CSAFPID-220194", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance:14.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance_process_management", "product": { "name": "banking_trade_finance_process_management", "product_id": "CSAFPID-764266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance_process_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance_process_management", "product": { "name": "banking_trade_finance_process_management", "product_id": "CSAFPID-220157", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.5.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance_process_management", "product": { "name": "banking_trade_finance_process_management", "product_id": "CSAFPID-220155", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.6.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance_process_management", "product": { "name": "banking_trade_finance_process_management", "product_id": "CSAFPID-220153", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.7.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_trade_finance_process_management", "product": { "name": "banking_trade_finance_process_management", "product_id": "CSAFPID-220150", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_trade_finance_process_management:14.7.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_treasury_management", "product": { "name": "banking_treasury_management", "product_id": "CSAFPID-764749", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_treasury_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_treasury_management", "product": { "name": "banking_treasury_management", "product_id": "CSAFPID-94389", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_treasury_management:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_treasury_management", "product": { "name": "banking_treasury_management", "product_id": "CSAFPID-220553", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_treasury_management:14.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_treasury_management", "product": { "name": "banking_treasury_management", "product_id": "CSAFPID-220195", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_treasury_management:14.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-764267", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912099", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-180211", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912098", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-201568", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912097", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-201569", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:14.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912586", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:_common_core___14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:_common_core___14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "banking_virtual_account_management", "product": { "name": "banking_virtual_account_management", "product_id": "CSAFPID-912588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:banking_virtual_account_management:_common_core___14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9711", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.7.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9300", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-9522", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345043", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.0.9.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-8848", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-345042", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189066", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-93309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189065", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-93305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189064", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_infrastructure", "product": { "name": "financial_services_analytical_applications_infrastructure", "product_id": "CSAFPID-189063", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_infrastructure:8.1.2.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_reconciliation_framework", "product": { "name": "financial_services_analytical_applications_reconciliation_framework", "product_id": "CSAFPID-363146", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.0.7.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_analytical_applications_reconciliation_framework", "product": { "name": "financial_services_analytical_applications_reconciliation_framework", "product_id": "CSAFPID-363129", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_analytical_applications_reconciliation_framework:8.1.1.1.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674656", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.4.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674659", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.5.0.12.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674662", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.6.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674666", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.7.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.7.0.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674664", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.7.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674658", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:14.7.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674653", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:19.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674668", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:21.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674669", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:22.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674667", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:22.2.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674655", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:3.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674657", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:4.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674660", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:5.0.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674654", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_applications", "product": { "name": "financial_services_applications", "product_id": "CSAFPID-1674665", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_applications:8.1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_asset_liability_management", "product": { "name": "financial_services_asset_liability_management", "product_id": "CSAFPID-363142", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_asset_liability_management:8.0.7.8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_balance_computation_engine", "product": { "name": "financial_services_balance_computation_engine", "product_id": "CSAFPID-363130", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_balance_computation_engine:8.1.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_balance_sheet_planning", "product": { "name": "financial_services_balance_sheet_planning", "product_id": "CSAFPID-363135", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_balance_sheet_planning:8.0.8.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_basic", "product": { "name": "financial_services_basel_regulatory_capital_basic", "product_id": "CSAFPID-1503626", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_basic", "product": { "name": "financial_services_basel_regulatory_capital_basic", "product_id": "CSAFPID-1503627", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_basic:8.0.8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product": { "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product_id": "CSAFPID-1503628", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.0.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product": { "name": "financial_services_basel_regulatory_capital_internal_ratings_based_approach", "product_id": "CSAFPID-1503629", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_basel_regulatory_capital_internal_ratings_based_approach:8.0.8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-189067", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-93307", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-345041", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-219772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-219770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-816828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_behavior_detection_platform", "product": { "name": "financial_services_behavior_detection_platform", "product_id": "CSAFPID-1503630", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_cash_flow_engine", "product": { "name": "financial_services_cash_flow_engine", "product_id": "CSAFPID-764273", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_cash_flow_engine:8.1.2.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-345047", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-816829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-1503631", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-1503632", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_compliance_studio", "product": { "name": "financial_services_compliance_studio", "product_id": "CSAFPID-1673398", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_compliance_studio:8.1.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_crime_and_compliance_management_studio", "product": { "name": "financial_services_crime_and_compliance_management_studio", "product_id": "CSAFPID-391382", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493291", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.0.8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.2.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_currency_transaction_reporting", "product": { "name": "financial_services_currency_transaction_reporting", "product_id": "CSAFPID-493288", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_currency_transaction_reporting:8.1.2.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_governance_for_us_regulatory_reporting", "product": { "name": "financial_services_data_governance_for_us_regulatory_reporting", "product_id": "CSAFPID-363128", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_governance_for_us_regulatory_reporting", "product": { "name": "financial_services_data_governance_for_us_regulatory_reporting", "product_id": "CSAFPID-363127", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_governance_for_us_regulatory_reporting:8.1.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363131", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.0.1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_data_integration_hub", "product": { "name": "financial_services_data_integration_hub", "product_id": "CSAFPID-363126", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_data_integration_hub:8.1.2.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product": { "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product_id": "CSAFPID-363143", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_deposit_insurance_calculations_for_liquidity_risk_management:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product": { "name": "financial_services_deposit_insurance_calculations_for_liquidity_risk_management", "product_id": "CSAFPID-363133", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_deposit_insurance_calculations_for_liquidity_risk_management:8.0.8.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503633", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.0.8.2.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-180190", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503634", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.1.1.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-345040", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-219771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-816830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503635", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_case_management", "product": { "name": "financial_services_enterprise_case_management", "product_id": "CSAFPID-1503636", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_case_management:8.1.2.7.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_enterprise_financial_performance_analytics", "product": { "name": "financial_services_enterprise_financial_performance_analytics", "product_id": "CSAFPID-363141", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_enterprise_financial_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_funds_transfer_pricing", "product": { "name": "financial_services_funds_transfer_pricing", "product_id": "CSAFPID-363138", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_funds_transfer_pricing:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_institutional_performance_analytics", "product": { "name": "financial_services_institutional_performance_analytics", "product_id": "CSAFPID-363136", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_institutional_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_lending_and_leasing", "product": { "name": "financial_services_lending_and_leasing", "product_id": "CSAFPID-816831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_lending_and_leasing:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_liquidity_risk_measurement_and_management", "product": { "name": "financial_services_liquidity_risk_measurement_and_management", "product_id": "CSAFPID-363145", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.7.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_liquidity_risk_measurement_and_management", "product": { "name": "financial_services_liquidity_risk_measurement_and_management", "product_id": "CSAFPID-363132", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_liquidity_risk_measurement_and_management:8.0.8.3.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_loan_loss_forecasting_and_provisioning", "product": { "name": "financial_services_loan_loss_forecasting_and_provisioning", "product_id": "CSAFPID-363140", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_loan_loss_forecasting_and_provisioning", "product": { "name": "financial_services_loan_loss_forecasting_and_provisioning", "product_id": "CSAFPID-363134", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_loan_loss_forecasting_and_provisioning:8.0.8.2.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-396508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-396507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-611392", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-611391", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1503319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_model_management_and_governance", "product": { "name": "financial_services_model_management_and_governance", "product_id": "CSAFPID-1503318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_model_management_and_governance:8.1.2.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_profitability_management", "product": { "name": "financial_services_profitability_management", "product_id": "CSAFPID-363139", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_profitability_management:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting_with_agilereporter", "product": { "name": "financial_services_regulatory_reporting_with_agilereporter", "product_id": "CSAFPID-611433", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.1.1.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.0.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.1.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570312", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_regulatory_reporting", "product": { "name": "financial_services_regulatory_reporting", "product_id": "CSAFPID-570311", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_regulatory_reporting:8.1.2.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_retail_performance_analytics", "product": { "name": "financial_services_retail_performance_analytics", "product_id": "CSAFPID-363137", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_retail_performance_analytics:8.0.7.8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-765266", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-219833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-344846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.7.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "financial_services_revenue_management_and_billing", "product": { "name": "financial_services_revenue_management_and_billing", "product_id": "CSAFPID-912589", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:financial_services_revenue_management_and_billing:2.8.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-31160", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-9390", "CSAFPID-204520", "CSAFPID-94302", "CSAFPID-94301", "CSAFPID-94300", "CSAFPID-94299", "CSAFPID-94296", "CSAFPID-94294", "CSAFPID-764256", "CSAFPID-764257", "CSAFPID-764258", "CSAFPID-764259", "CSAFPID-764260", "CSAFPID-611428", "CSAFPID-387666", "CSAFPID-9569", "CSAFPID-9611", "CSAFPID-9198", "CSAFPID-94298", "CSAFPID-94297", "CSAFPID-94293", "CSAFPID-764261", "CSAFPID-764262", "CSAFPID-611718", "CSAFPID-764263", "CSAFPID-387665", "CSAFPID-764264", "CSAFPID-9430", "CSAFPID-764265", "CSAFPID-631680", "CSAFPID-764266", "CSAFPID-764267", "CSAFPID-764273", "CSAFPID-611392", "CSAFPID-611391", "CSAFPID-221114", "CSAFPID-221111", "CSAFPID-221109", "CSAFPID-221107", "CSAFPID-221106", "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-220172", "CSAFPID-220168", "CSAFPID-220170", "CSAFPID-221113", "CSAFPID-221112", "CSAFPID-221110", "CSAFPID-221108", "CSAFPID-221105", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-220156", "CSAFPID-764747", "CSAFPID-220154", "CSAFPID-764748", "CSAFPID-220152", "CSAFPID-220151", "CSAFPID-224806", "CSAFPID-220173", "CSAFPID-258398", "CSAFPID-220171", "CSAFPID-220169", "CSAFPID-220157", "CSAFPID-220155", "CSAFPID-220153", "CSAFPID-220150", "CSAFPID-764749", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-8848", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-219772", "CSAFPID-219770", "CSAFPID-345047", "CSAFPID-219774", "CSAFPID-180190", "CSAFPID-219773", "CSAFPID-219771", "CSAFPID-189064", "CSAFPID-189063", "CSAFPID-363146", "CSAFPID-363129", "CSAFPID-363142", "CSAFPID-363130", "CSAFPID-363135", "CSAFPID-345041", "CSAFPID-391382", "CSAFPID-493291", "CSAFPID-493290", "CSAFPID-493289", "CSAFPID-493288", "CSAFPID-363128", "CSAFPID-363127", "CSAFPID-363144", "CSAFPID-363131", "CSAFPID-363126", "CSAFPID-363143", "CSAFPID-363133", "CSAFPID-345040", "CSAFPID-363141", "CSAFPID-363138", "CSAFPID-363136", "CSAFPID-363145", "CSAFPID-363132", "CSAFPID-363140", "CSAFPID-363134", "CSAFPID-396508", "CSAFPID-396507", "CSAFPID-363139", "CSAFPID-570314", "CSAFPID-570313", "CSAFPID-570312", "CSAFPID-94303", "CSAFPID-9129", "CSAFPID-94387", "CSAFPID-220552", "CSAFPID-220160", "CSAFPID-94386", "CSAFPID-344967", "CSAFPID-220194", "CSAFPID-94389", "CSAFPID-220553", "CSAFPID-220195", "CSAFPID-180211", "CSAFPID-201568", "CSAFPID-201569", "CSAFPID-345045", "CSAFPID-345044", "CSAFPID-345043", "CSAFPID-345042", "CSAFPID-93309", "CSAFPID-93305", "CSAFPID-570311", "CSAFPID-611433", "CSAFPID-363137", "CSAFPID-219833", "CSAFPID-344846", "CSAFPID-816813", "CSAFPID-816814", "CSAFPID-816815", "CSAFPID-816816", "CSAFPID-816817", "CSAFPID-816818", "CSAFPID-816819", "CSAFPID-816820", "CSAFPID-816821", "CSAFPID-816822", "CSAFPID-816823", "CSAFPID-816824", "CSAFPID-816825", "CSAFPID-9522", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-765266", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-912568", "CSAFPID-912088", "CSAFPID-912569", "CSAFPID-912087", "CSAFPID-912570", "CSAFPID-912086", "CSAFPID-912571", "CSAFPID-912091", "CSAFPID-912572", "CSAFPID-912090", "CSAFPID-912573", "CSAFPID-912089", "CSAFPID-912574", "CSAFPID-912575", "CSAFPID-912576", "CSAFPID-912577", "CSAFPID-912094", "CSAFPID-912578", "CSAFPID-912093", "CSAFPID-912579", "CSAFPID-912092", "CSAFPID-912580", "CSAFPID-912581", "CSAFPID-912582", "CSAFPID-912064", "CSAFPID-912583", "CSAFPID-912063", "CSAFPID-912584", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-912585", "CSAFPID-912096", "CSAFPID-912586", "CSAFPID-912099", "CSAFPID-912587", "CSAFPID-912098", "CSAFPID-912588", "CSAFPID-912097", "CSAFPID-912589", "CSAFPID-1503320", "CSAFPID-1503613", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-1503621", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2022-31160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-31160.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-9390", "CSAFPID-204520", "CSAFPID-94302", "CSAFPID-94301", "CSAFPID-94300", "CSAFPID-94299", "CSAFPID-94296", "CSAFPID-94294", "CSAFPID-764256", "CSAFPID-764257", "CSAFPID-764258", "CSAFPID-764259", "CSAFPID-764260", "CSAFPID-611428", "CSAFPID-387666", "CSAFPID-9569", "CSAFPID-9611", "CSAFPID-9198", "CSAFPID-94298", "CSAFPID-94297", "CSAFPID-94293", "CSAFPID-764261", "CSAFPID-764262", "CSAFPID-611718", "CSAFPID-764263", "CSAFPID-387665", "CSAFPID-764264", "CSAFPID-9430", "CSAFPID-764265", "CSAFPID-631680", "CSAFPID-764266", "CSAFPID-764267", "CSAFPID-764273", "CSAFPID-611392", "CSAFPID-611391", "CSAFPID-221114", "CSAFPID-221111", "CSAFPID-221109", "CSAFPID-221107", "CSAFPID-221106", "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-220172", "CSAFPID-220168", "CSAFPID-220170", "CSAFPID-221113", "CSAFPID-221112", "CSAFPID-221110", "CSAFPID-221108", "CSAFPID-221105", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-220156", "CSAFPID-764747", "CSAFPID-220154", "CSAFPID-764748", "CSAFPID-220152", "CSAFPID-220151", "CSAFPID-224806", "CSAFPID-220173", "CSAFPID-258398", "CSAFPID-220171", "CSAFPID-220169", "CSAFPID-220157", "CSAFPID-220155", "CSAFPID-220153", "CSAFPID-220150", "CSAFPID-764749", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-8848", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-219772", "CSAFPID-219770", "CSAFPID-345047", "CSAFPID-219774", "CSAFPID-180190", "CSAFPID-219773", "CSAFPID-219771", "CSAFPID-189064", "CSAFPID-189063", "CSAFPID-363146", "CSAFPID-363129", "CSAFPID-363142", "CSAFPID-363130", "CSAFPID-363135", "CSAFPID-345041", "CSAFPID-391382", "CSAFPID-493291", "CSAFPID-493290", "CSAFPID-493289", "CSAFPID-493288", "CSAFPID-363128", "CSAFPID-363127", "CSAFPID-363144", "CSAFPID-363131", "CSAFPID-363126", "CSAFPID-363143", "CSAFPID-363133", "CSAFPID-345040", "CSAFPID-363141", "CSAFPID-363138", "CSAFPID-363136", "CSAFPID-363145", "CSAFPID-363132", "CSAFPID-363140", "CSAFPID-363134", "CSAFPID-396508", "CSAFPID-396507", "CSAFPID-363139", "CSAFPID-570314", "CSAFPID-570313", "CSAFPID-570312", "CSAFPID-94303", "CSAFPID-9129", "CSAFPID-94387", "CSAFPID-220552", "CSAFPID-220160", "CSAFPID-94386", "CSAFPID-344967", "CSAFPID-220194", "CSAFPID-94389", "CSAFPID-220553", "CSAFPID-220195", "CSAFPID-180211", "CSAFPID-201568", "CSAFPID-201569", "CSAFPID-345045", "CSAFPID-345044", "CSAFPID-345043", "CSAFPID-345042", "CSAFPID-93309", "CSAFPID-93305", "CSAFPID-570311", "CSAFPID-611433", "CSAFPID-363137", "CSAFPID-219833", "CSAFPID-344846", "CSAFPID-816813", "CSAFPID-816814", "CSAFPID-816815", "CSAFPID-816816", "CSAFPID-816817", "CSAFPID-816818", "CSAFPID-816819", "CSAFPID-816820", "CSAFPID-816821", "CSAFPID-816822", "CSAFPID-816823", "CSAFPID-816824", "CSAFPID-816825", "CSAFPID-9522", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-765266", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-912568", "CSAFPID-912088", "CSAFPID-912569", "CSAFPID-912087", "CSAFPID-912570", "CSAFPID-912086", "CSAFPID-912571", "CSAFPID-912091", "CSAFPID-912572", "CSAFPID-912090", "CSAFPID-912573", "CSAFPID-912089", "CSAFPID-912574", "CSAFPID-912575", "CSAFPID-912576", "CSAFPID-912577", "CSAFPID-912094", "CSAFPID-912578", "CSAFPID-912093", "CSAFPID-912579", "CSAFPID-912092", "CSAFPID-912580", "CSAFPID-912581", "CSAFPID-912582", "CSAFPID-912064", "CSAFPID-912583", "CSAFPID-912063", "CSAFPID-912584", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-912585", "CSAFPID-912096", "CSAFPID-912586", "CSAFPID-912099", "CSAFPID-912587", "CSAFPID-912098", "CSAFPID-912588", "CSAFPID-912097", "CSAFPID-912589", "CSAFPID-1503320", "CSAFPID-1503613", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-1503621", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2022-31160" }, { "cve": "CVE-2023-34055", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673398", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-221109", "CSAFPID-221107", "CSAFPID-221106", "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-221110", "CSAFPID-221108", "CSAFPID-221105", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-344846", "CSAFPID-764256", "CSAFPID-764257", "CSAFPID-764259", "CSAFPID-764260", "CSAFPID-764261", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-764265", "CSAFPID-764266", "CSAFPID-764267", "CSAFPID-765266", "CSAFPID-816813", "CSAFPID-816814", "CSAFPID-816815", "CSAFPID-816816", "CSAFPID-816817", "CSAFPID-816818", "CSAFPID-816819", "CSAFPID-816820", "CSAFPID-816821", "CSAFPID-816822", "CSAFPID-816823", "CSAFPID-816824", "CSAFPID-816825", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-912062", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912095", "CSAFPID-912096", "CSAFPID-912097", "CSAFPID-912098", "CSAFPID-912099", "CSAFPID-912568", "CSAFPID-912569", "CSAFPID-912570", "CSAFPID-912571", "CSAFPID-912572", "CSAFPID-912573", "CSAFPID-912574", "CSAFPID-912575", "CSAFPID-912576", "CSAFPID-912577", "CSAFPID-912578", "CSAFPID-912579", "CSAFPID-912580", "CSAFPID-912581", "CSAFPID-912582", "CSAFPID-912583", "CSAFPID-912584", "CSAFPID-912585", "CSAFPID-912586", "CSAFPID-912587", "CSAFPID-912588", "CSAFPID-912589", "CSAFPID-1503320", "CSAFPID-1503613", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-1503621", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2023-34055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-34055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673398", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-221109", "CSAFPID-221107", "CSAFPID-221106", "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-221110", "CSAFPID-221108", "CSAFPID-221105", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-8848", "CSAFPID-9300", "CSAFPID-9522", "CSAFPID-9711", "CSAFPID-93307", "CSAFPID-180190", "CSAFPID-189065", "CSAFPID-189066", "CSAFPID-189067", "CSAFPID-219770", "CSAFPID-219771", "CSAFPID-219774", "CSAFPID-344846", "CSAFPID-764256", "CSAFPID-764257", "CSAFPID-764259", "CSAFPID-764260", "CSAFPID-764261", "CSAFPID-764262", "CSAFPID-764263", "CSAFPID-764265", "CSAFPID-764266", "CSAFPID-764267", "CSAFPID-765266", "CSAFPID-816813", "CSAFPID-816814", "CSAFPID-816815", "CSAFPID-816816", "CSAFPID-816817", "CSAFPID-816818", "CSAFPID-816819", "CSAFPID-816820", "CSAFPID-816821", "CSAFPID-816822", "CSAFPID-816823", "CSAFPID-816824", "CSAFPID-816825", "CSAFPID-816828", "CSAFPID-816829", "CSAFPID-816830", "CSAFPID-816831", "CSAFPID-912062", "CSAFPID-912093", "CSAFPID-912094", "CSAFPID-912095", "CSAFPID-912096", "CSAFPID-912097", "CSAFPID-912098", "CSAFPID-912099", "CSAFPID-912568", "CSAFPID-912569", "CSAFPID-912570", "CSAFPID-912571", "CSAFPID-912572", "CSAFPID-912573", "CSAFPID-912574", "CSAFPID-912575", "CSAFPID-912576", "CSAFPID-912577", "CSAFPID-912578", "CSAFPID-912579", "CSAFPID-912580", "CSAFPID-912581", "CSAFPID-912582", "CSAFPID-912583", "CSAFPID-912584", "CSAFPID-912585", "CSAFPID-912586", "CSAFPID-912587", "CSAFPID-912588", "CSAFPID-912589", "CSAFPID-1503320", "CSAFPID-1503613", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-1503621", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2023-34055" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-1673398", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673398", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-50447", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "other", "text": "Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "title": "CWE-95" } ], "product_status": { "known_affected": [ "CSAFPID-1673398", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2023-50447", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50447.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673398", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2023-50447" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1673398", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json" } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-1673482", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673482", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673520", "CSAFPID-1673521", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673520", "CSAFPID-1673521", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-21281", "product_status": { "known_affected": [ "CSAFPID-1673189", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21281", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21281.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673189", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-21281" }, { "cve": "CVE-2024-21284", "product_status": { "known_affected": [ "CSAFPID-1673190", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21284", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21284.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673190", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-21284" }, { "cve": "CVE-2024-21285", "product_status": { "known_affected": [ "CSAFPID-1673190", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21285", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21285.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673190", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-21285" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-221102", "CSAFPID-221103", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-221102", "CSAFPID-221103", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-221107", "CSAFPID-221103", "CSAFPID-221106", "CSAFPID-221102", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-221107", "CSAFPID-221103", "CSAFPID-221106", "CSAFPID-221102", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-32007", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673498", "CSAFPID-1673499", "CSAFPID-1673500", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32007", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32007.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673498", "CSAFPID-1673499", "CSAFPID-1673500", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-32007" }, { "cve": "CVE-2024-32114", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "notes": [ { "category": "other", "text": "Missing Authentication for Critical Function", "title": "CWE-306" }, { "category": "other", "text": "Initialization of a Resource with an Insecure Default", "title": "CWE-1188" } ], "product_status": { "known_affected": [ "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32114", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32114.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-221103", "CSAFPID-221102", "CSAFPID-221104", "CSAFPID-221101", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669", "CSAFPID-1503320", "CSAFPID-912088", "CSAFPID-912087", "CSAFPID-912086", "CSAFPID-1503613", "CSAFPID-912091", "CSAFPID-912090", "CSAFPID-912089", "CSAFPID-1503614", "CSAFPID-1503615", "CSAFPID-1503616", "CSAFPID-1503617", "CSAFPID-1503618", "CSAFPID-1503619", "CSAFPID-1503620", "CSAFPID-912574", "CSAFPID-912094", "CSAFPID-912093", "CSAFPID-912092", "CSAFPID-912064", "CSAFPID-912063", "CSAFPID-912062", "CSAFPID-912095", "CSAFPID-1503621", "CSAFPID-912099", "CSAFPID-912098", "CSAFPID-912097", "CSAFPID-9711", "CSAFPID-9300", "CSAFPID-189066", "CSAFPID-189065", "CSAFPID-1503626", "CSAFPID-1503627", "CSAFPID-1503628", "CSAFPID-1503629", "CSAFPID-189067", "CSAFPID-93307", "CSAFPID-816828", "CSAFPID-1503630", "CSAFPID-1503631", "CSAFPID-1503632", "CSAFPID-1503633", "CSAFPID-1503634", "CSAFPID-1503635", "CSAFPID-1503636", "CSAFPID-1503319", "CSAFPID-1503318" ] } ], "title": "CVE-2024-32114" }, { "cve": "CVE-2024-43407", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-221102", "CSAFPID-221108", "CSAFPID-221107", "CSAFPID-221104", "CSAFPID-221103", "CSAFPID-221105", "CSAFPID-221101", "CSAFPID-221106", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] }, "references": [ { "category": "self", "summary": "CVE-2024-43407", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43407.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-221102", "CSAFPID-221108", "CSAFPID-221107", "CSAFPID-221104", "CSAFPID-221103", "CSAFPID-221105", "CSAFPID-221101", "CSAFPID-221106", "CSAFPID-1674653", "CSAFPID-1674654", "CSAFPID-1674655", "CSAFPID-1674656", "CSAFPID-1674657", "CSAFPID-1674658", "CSAFPID-1674659", "CSAFPID-1674660", "CSAFPID-1674661", "CSAFPID-1674662", "CSAFPID-1674663", "CSAFPID-1674664", "CSAFPID-1674665", "CSAFPID-1674666", "CSAFPID-1674667", "CSAFPID-1674668", "CSAFPID-1674669" ] } ], "title": "CVE-2024-43407" } ] }
ncsc-2024-0415
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in Enterprise Manager.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens\n", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Reliance on Component That is Not Updateable", "title": "CWE-1329" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Enterprise Manager", "tracking": { "current_release_date": "2024-10-17T13:18:06.611153Z", "id": "NCSC-2024-0415", "initial_release_date": "2024-10-17T13:18:06.611153Z", "revision_history": [ { "date": "2024-10-17T13:18:06.611153Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "enterprise_asset_management", "product": { "name": "enterprise_asset_management", "product_id": "CSAFPID-915800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_asset_management:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_data_quality", "product": { "name": "enterprise_data_quality", "product_id": "CSAFPID-200924", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_data_quality:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager", "product": { "name": "enterprise_manager", "product_id": "CSAFPID-1674652", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager", "product": { "name": "enterprise_manager", "product_id": "CSAFPID-1674650", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager:13.3.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager", "product": { "name": "enterprise_manager", "product_id": "CSAFPID-817088", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager", "product": { "name": "enterprise_manager", "product_id": "CSAFPID-1674651", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager:13.5.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_base_platform", "product": { "name": "enterprise_manager_base_platform", "product_id": "CSAFPID-1673387", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_base_platform", "product": { "name": "enterprise_manager_base_platform", "product_id": "CSAFPID-179794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_base_platform", "product": { "name": "enterprise_manager_base_platform", "product_id": "CSAFPID-816810", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:_agent_next_gen___13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_base_platform", "product": { "name": "enterprise_manager_base_platform", "product_id": "CSAFPID-816811", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_base_platform:_extensibility_framework___13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_for__database", "product": { "name": "enterprise_manager_for__database", "product_id": "CSAFPID-764745", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_for__database:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_for__virtual_infrastructure", "product": { "name": "enterprise_manager_for__virtual_infrastructure", "product_id": "CSAFPID-816812", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_for__virtual_infrastructure:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_for_fusion_middleware", "product": { "name": "enterprise_manager_for_fusion_middleware", "product_id": "CSAFPID-220465", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_for_fusion_middleware:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_for_peoplesoft", "product": { "name": "enterprise_manager_for_peoplesoft", "product_id": "CSAFPID-1673408", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_for_peoplesoft:13.5.1.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_for_virtualization", "product": { "name": "enterprise_manager_for_virtualization", "product_id": "CSAFPID-611588", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_for_virtualization:13.5.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "enterprise_manager_ops_center", "product": { "name": "enterprise_manager_ops_center", "product_id": "CSAFPID-9557", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_testing_suite", "product": { "name": "application_testing_suite", "product_id": "CSAFPID-5546", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34381", "cwe": { "id": "CWE-1329", "name": "Reliance on Component That is Not Updateable" }, "notes": [ { "category": "other", "text": "Reliance on Component That is Not Updateable", "title": "CWE-1329" } ], "product_status": { "known_affected": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-220465", "CSAFPID-200924", "CSAFPID-915800" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34381", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34381.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-220465", "CSAFPID-200924", "CSAFPID-915800" ] } ], "title": "CVE-2022-34381" }, { "cve": "CVE-2023-28823", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673387", "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-9557", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-611588", "CSAFPID-764745", "CSAFPID-816810", "CSAFPID-816811", "CSAFPID-816812" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28823", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28823.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673387", "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-9557", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-611588", "CSAFPID-764745", "CSAFPID-816810", "CSAFPID-816811", "CSAFPID-816812" ] } ], "title": "CVE-2023-28823" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-915800", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-915800", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-44483", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "notes": [ { "category": "other", "text": "Insertion of Sensitive Information into Log File", "title": "CWE-532" } ], "product_status": { "known_affected": [ "CSAFPID-1673408", "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-9557", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-611588", "CSAFPID-764745", "CSAFPID-816810", "CSAFPID-816811", "CSAFPID-816812", "CSAFPID-915800" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44483", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44483.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673408", "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-9557", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-611588", "CSAFPID-764745", "CSAFPID-816810", "CSAFPID-816811", "CSAFPID-816812", "CSAFPID-915800" ] } ], "title": "CVE-2023-44483" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-220465", "CSAFPID-200924", "CSAFPID-915800" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-220465", "CSAFPID-200924", "CSAFPID-915800" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-915800" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924", "CSAFPID-220465", "CSAFPID-915800" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-915800", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1674650", "CSAFPID-1674651", "CSAFPID-817088", "CSAFPID-1674652", "CSAFPID-915800", "CSAFPID-5546", "CSAFPID-179794", "CSAFPID-200924" ] } ], "title": "CVE-2024-29025" } ] }
ncsc-2024-0303
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Er zijn kwetsbaarheden verholpen in Oracle MySQL.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24112" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6129" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20996" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21125" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21127" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21129" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21130" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21134" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21135" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21137" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21142" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21157" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21159" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21160" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21162" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21163" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21165" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21166" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21170" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21171" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21173" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21176" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21177" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21179" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549" }, { "category": "external", "summary": "Source - nvd", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062" }, { "category": "external", "summary": "Reference - oracle", "url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json" }, { "category": "external", "summary": "Reference - cveprojectv5; ibm; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujul2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle MySQL", "tracking": { "current_release_date": "2024-07-17T13:54:56.036488Z", "id": "NCSC-2024-0303", "initial_release_date": "2024-07-17T13:54:56.036488Z", "revision_history": [ { "date": "2024-07-17T13:54:56.036488Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "mysql_cluster", "product": { "name": "mysql_cluster", "product_id": "CSAFPID-764289", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_cluster", "product": { "name": "mysql_cluster", "product_id": "CSAFPID-1503737", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_cluster", "product": { "name": "mysql_cluster", "product_id": "CSAFPID-611599", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_cluster", "product": { "name": "mysql_cluster", "product_id": "CSAFPID-1503740", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_connectors", "product": { "name": "mysql_connectors", "product_id": "CSAFPID-221160", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_connectors", "product": { "name": "mysql_connectors", "product_id": "CSAFPID-912112", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_connectors:8.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_connectors", "product": { "name": "mysql_connectors", "product_id": "CSAFPID-1503309", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_connectors:8.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_enterprise_backup", "product": { "name": "mysql_enterprise_backup", "product_id": "CSAFPID-764939", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_enterprise_backup", "product": { "name": "mysql_enterprise_backup", "product_id": "CSAFPID-912114", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_enterprise_backup", "product": { "name": "mysql_enterprise_backup", "product_id": "CSAFPID-912113", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_enterprise_monitor", "product": { "name": "mysql_enterprise_monitor", "product_id": "CSAFPID-764290", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_enterprise_monitor", "product": { "name": "mysql_enterprise_monitor", "product_id": "CSAFPID-912115", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503882", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503876", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503792", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503836", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503842", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503786", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503856", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503878", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503888", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503866", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503788", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503851", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503843", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503804", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503823", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503809", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503837", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503796", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503762", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503880", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503887", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503768", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503778", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503862", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503818", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503782", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503869", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503771", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503860", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503885", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503872", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503789", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503849", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503841", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503805", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503840", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503848", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503859", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503868", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503873", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503881", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503817", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503777", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503808", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503769", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503802", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503830", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503784", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503838", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503863", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503847", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503857", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503877", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503883", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503832", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503858", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503776", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503850", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503824", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503821", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503810", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503770", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503828", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503775", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503773", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503865", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503864", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503781", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503787", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503793", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503839", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503811", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503820", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.35:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503794", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503790", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503780", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503797", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503826", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503814", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503807", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503806", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_ndb_cluster", "product": { "name": "mysql_ndb_cluster", "product_id": "CSAFPID-1503801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-504250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-912117", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-1503653", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-611602", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-912116", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-1503657", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_server", "product": { "name": "mysql_server", "product_id": "CSAFPID-1503659", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_workbench", "product": { "name": "mysql_workbench", "product_id": "CSAFPID-764763", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql_workbench", "product": { "name": "mysql_workbench", "product_id": "CSAFPID-1503321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql_workbench:8.0.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93496", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93494", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93490", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93487", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93486", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93485", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93484", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93483", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93482", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93481", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93480", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503875", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503884", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503829", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503783", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503827", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503815", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503812", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503774", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93478", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93477", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93476", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93475", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93474", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93473", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93472", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93471", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93470", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93469", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93468", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93467", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93466", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93465", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93464", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93463", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93462", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503834", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93461", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93460", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503874", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503867", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503833", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503785", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503772", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503795", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503819", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93459", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503791", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93458", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93457", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93456", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93455", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93454", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93453", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93339", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93337", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93336", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93335", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93334", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93333", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93332", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93331", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93330", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93329", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93328", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93327", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93326", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93325", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93324", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93323", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93322", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.23:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93321", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93320", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93319", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93318", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-283963", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.29:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93316", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-283962", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.30:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-283964", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.31:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-94333", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-248612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-716944", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.34:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913003", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.35:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913004", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.36:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503879", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.37:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503922", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.38:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93314", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-93313", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-912999", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913000", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913001", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913002", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913005", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913006", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-913007", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503844", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503921", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:8.4.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "mysql", "product": { "name": "mysql", "product_id": "CSAFPID-1503920", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:mysql:9.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-24112", "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-764763", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659" ] }, "references": [ { "category": "self", "summary": "CVE-2021-24112", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24112.json" } ], "title": "CVE-2021-24112" }, { "cve": "CVE-2023-6129", "cwe": { "id": "CWE-328", "name": "Use of Weak Hash" }, "notes": [ { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "product_status": { "known_affected": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2023-6129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2023-6129" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-611599", "CSAFPID-611602", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764763", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-611599", "CSAFPID-611602", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764763", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2024-0450", "cwe": { "id": "CWE-450", "name": "Multiple Interpretations of UI Input" }, "notes": [ { "category": "other", "text": "Multiple Interpretations of UI Input", "title": "CWE-450" }, { "category": "other", "text": "Asymmetric Resource Consumption (Amplification)", "title": "CWE-405" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-0450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-0450" }, { "cve": "CVE-2024-20996", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-20996", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20996.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-20996" }, { "cve": "CVE-2024-21125", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21125", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21125.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21125" }, { "cve": "CVE-2024-21127", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21127" }, { "cve": "CVE-2024-21129", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21129.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21129" }, { "cve": "CVE-2024-21130", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21130" }, { "cve": "CVE-2024-21134", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21134", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21134.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21134" }, { "cve": "CVE-2024-21135", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21135" }, { "cve": "CVE-2024-21137", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21137" }, { "cve": "CVE-2024-21142", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21142", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21142.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21142" }, { "cve": "CVE-2024-21157", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21157", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21157.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21157" }, { "cve": "CVE-2024-21159", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21159", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21159.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21159" }, { "cve": "CVE-2024-21160", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21160.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21160" }, { "cve": "CVE-2024-21162", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21162.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21162" }, { "cve": "CVE-2024-21163", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21163.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21163" }, { "cve": "CVE-2024-21165", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21165.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21165" }, { "cve": "CVE-2024-21166", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21166.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21166" }, { "cve": "CVE-2024-21170", "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21170" }, { "cve": "CVE-2024-21171", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21171" }, { "cve": "CVE-2024-21173", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21173", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21173.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21173" }, { "cve": "CVE-2024-21176", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21176" }, { "cve": "CVE-2024-21177", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21177" }, { "cve": "CVE-2024-21179", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21179", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21179.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21179" }, { "cve": "CVE-2024-21185", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21185", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21185.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-21185" }, { "cve": "CVE-2024-22257", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-22257" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764289", "CSAFPID-221160", "CSAFPID-764290", "CSAFPID-504250", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-24549", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24549", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-24549" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-221160", "CSAFPID-504250", "CSAFPID-764289", "CSAFPID-764290", "CSAFPID-764939", "CSAFPID-1503653", "CSAFPID-1503657", "CSAFPID-1503659", "CSAFPID-764763" ] } ], "title": "CVE-2024-25062" } ] }
ncsc-2024-0411
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse Database producten en subsystemen, zoals de Core database, Application Express, Autonomous Health Framework, Essbase, GoldenGate, SQL Developer en Secure Backup.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van data\n- Toegang tot gevoelige gegevens", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "general", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "general", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "general", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "Encoding Error", "title": "CWE-172" }, { "category": "general", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" }, { "category": "general", "text": "Untrusted Search Path", "title": "CWE-426" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "general", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" }, { "category": "general", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "general", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "CWE-18", "title": "CWE-18" }, { "category": "general", "text": "Covert Timing Channel", "title": "CWE-385" }, { "category": "general", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" }, { "category": "general", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "general", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "general", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Missing Critical Step in Authentication", "title": "CWE-304" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat", "url": "https://www.oracle.com/security-alerts/cpuoct2024.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2024-10-17T13:15:19.595269Z", "id": "NCSC-2024-0411", "initial_release_date": "2024-10-17T13:15:19.595269Z", "revision_history": [ { "date": "2024-10-17T13:15:19.595269Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673504", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_grid", "product": { "name": "database_-_grid", "product_id": "CSAFPID-1673506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_grid:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673386", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673385", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_core", "product": { "name": "database_-_core", "product_id": "CSAFPID-1673442", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_core:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673507", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673509", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_security", "product": { "name": "database_-_security", "product_id": "CSAFPID-1673508", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_security:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph_mapviewer", "product": { "name": "spatial_and_graph_mapviewer", "product_id": "CSAFPID-912561", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph_mapviewer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-764250", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673511", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673512", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-816800", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "spatial_and_graph", "product": { "name": "spatial_and_graph", "product_id": "CSAFPID-1673529", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:spatial_and_graph:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning_-_micronaut", "product": { "name": "fleet_patching_and_provisioning_-_micronaut", "product_id": "CSAFPID-1673492", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning_-_micronaut:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "fleet_patching_and_provisioning", "product": { "name": "fleet_patching_and_provisioning", "product_id": "CSAFPID-1503603", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:fleet_patching_and_provisioning:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673445", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673443", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_xml_database", "product": { "name": "database_-_xml_database", "product_id": "CSAFPID-1673444", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_xml_database:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673451", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.24:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673450", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.15:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_java_vm", "product": { "name": "database_-_java_vm", "product_id": "CSAFPID-1673452", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816798", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-816799", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-1673525", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:prior_to_24.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912046", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.10:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.11:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816855", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816361", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912045", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503302", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912044", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-1503306", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:22.0.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816852", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.12:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912600", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition20.3.13:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816853", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.8:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-912601", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition21.3.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "graalvm_for_jdk", "product": { "name": "graalvm_for_jdk", "product_id": "CSAFPID-816854", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graalvm_for_jdk:graalvm_enterprise_edition22.3.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-816801", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sqlcl", "product": { "name": "sqlcl", "product_id": "CSAFPID-1673405", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sqlcl:23.4-23.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_administration", "product": { "name": "application_express_administration", "product_id": "CSAFPID-764731", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_administration:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_customers_plugin", "product": { "name": "application_express_customers_plugin", "product_id": "CSAFPID-764732", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_customers_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express_team_calendar_plugin", "product": { "name": "application_express_team_calendar_plugin", "product_id": "CSAFPID-764733", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express_team_calendar_plugin:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-266119", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673510", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765238", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "autonomous_health_framework", "product": { "name": "autonomous_health_framework", "product_id": "CSAFPID-765239", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:21c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-764779", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "blockchain_platform", "product": { "name": "blockchain_platform", "product_id": "CSAFPID-89587", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:blockchain_platform:21.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-765259", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:_security_and_provisioning___21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-187448", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-94075", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-220886", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.4.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-611394", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-816317", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.3.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-912567", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.4.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1503612", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.5.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "essbase", "product": { "name": "essbase", "product_id": "CSAFPID-1673479", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:essbase:21.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_essbase", "product": { "name": "oracle_essbase", "product_id": "CSAFPID-1650506", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_essbase:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1673404", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650831", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3-21.14.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data", "product": { "name": "goldengate_big_data", "product_id": "CSAFPID-764274", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-764752", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-1673384", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.9:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220192", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_stream_analytics", "product": { "name": "goldengate_stream_analytics", "product_id": "CSAFPID-220193", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.7:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-816846", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.0.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-611390", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_studio", "product": { "name": "goldengate_studio", "product_id": "CSAFPID-764803", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_studio:fusion_middleware_12.2.1.4.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_veridata", "product": { "name": "goldengate_veridata", "product_id": "CSAFPID-764275", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_veridata:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-219912", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19c:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_stream_analytics", "product": { "name": "oracle_goldengate_stream_analytics", "product_id": "CSAFPID-1650515", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_stream_analytics:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-764861", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "management_pack_for__goldengate", "product": { "name": "management_pack_for__goldengate", "product_id": "CSAFPID-1503640", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:management_pack_for__goldengate:12.2.1.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate_studio", "product": { "name": "oracle_goldengate_studio", "product_id": "CSAFPID-1650835", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate_studio:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_goldengate", "product": { "name": "oracle_goldengate", "product_id": "CSAFPID-1650575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764813", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503661", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1503663", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673497", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764764", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:19.5.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.28:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673491", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764766", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.55:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673495", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:21.2.71:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-764767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.26:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673493", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:22.3.45:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673489", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:23.3.33:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1673488", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:24.1.17:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650757", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_19.5.42:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650758", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_20.3.40:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650761", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_21.2.27:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650760", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_22.3.46:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "nosql_database", "product": { "name": "nosql_database", "product_id": "CSAFPID-1650759", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:nosql_database:prior_to_23.3.32:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_nosql_database", "product": { "name": "oracle_nosql_database", "product_id": "CSAFPID-1650584", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_nosql_database:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_secure_backup", "product": { "name": "oracle_secure_backup", "product_id": "CSAFPID-1650563", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "oracle_sql_developer", "product": { "name": "oracle_sql_developer", "product_id": "CSAFPID-1650638", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:oracle_sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-764822", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-220643", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:21.4.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816870", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:22.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-816871", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:23.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "sql_developer", "product": { "name": "sql_developer", "product_id": "CSAFPID-1673397", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:sql_developer:24.3.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" }, { "branches": [ { "category": "product_name", "name": "oracle_application_express", "product": { "name": "oracle_application_express", "product_id": "CSAFPID-1673144", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle_corporation:oracle_application_express:24.1:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle_corporation" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1471", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-220886", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764822", "CSAFPID-1650515", "CSAFPID-1650638", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-89587", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044" ] }, "references": [ { "category": "self", "summary": "CVE-2022-1471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-1471.json" } ], "title": "CVE-2022-1471" }, { "cve": "CVE-2022-34169", "cwe": { "id": "CWE-192", "name": "Integer Coercion Error" }, "notes": [ { "category": "other", "text": "Integer Coercion Error", "title": "CWE-192" }, { "category": "other", "text": "Incorrect Conversion between Numeric Types", "title": "CWE-681" } ], "product_status": { "known_affected": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-34169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-34169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-342816", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-764861", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-219912", "CSAFPID-765238", "CSAFPID-765239", "CSAFPID-765259", "CSAFPID-667692", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-34169" }, { "cve": "CVE-2022-36033", "cwe": { "id": "CWE-87", "name": "Improper Neutralization of Alternate XSS Syntax" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Alternate XSS Syntax", "title": "CWE-87" }, { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2022-36033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36033.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-220886", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764861", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-266119", "CSAFPID-187448", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-219912", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-667692", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-1503575", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2022-36033" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Integer Overflow to Buffer Overflow", "title": "CWE-680" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] }, "references": [ { "category": "self", "summary": "CVE-2022-37454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-37454.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-1650563", "CSAFPID-89587", "CSAFPID-764861" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-38136", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-38136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-38136.json" } ], "title": "CVE-2022-38136" }, { "cve": "CVE-2022-40196", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-40196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40196.json" } ], "title": "CVE-2022-40196" }, { "cve": "CVE-2022-41342", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2022-41342", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41342.json" } ], "title": "CVE-2022-41342" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "other", "text": "Missing Encryption of Sensitive Data", "title": "CWE-311" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-42919", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42919.json" } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Inefficient Algorithmic Complexity", "title": "CWE-407" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2022-45061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-45061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-342816", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764779", "CSAFPID-94075", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-611390", "CSAFPID-764803", "CSAFPID-764813", "CSAFPID-764822", "CSAFPID-89587" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-46337", "product_status": { "known_affected": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] }, "references": [ { "category": "self", "summary": "CVE-2022-46337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-46337.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-1673384", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-764752", "CSAFPID-764275", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-912046", "CSAFPID-912045", "CSAFPID-912044", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-764250", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692" ] } ], "title": "CVE-2022-46337" }, { "cve": "CVE-2023-2976", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "notes": [ { "category": "other", "text": "Files or Directories Accessible to External Parties", "title": "CWE-552" } ], "product_status": { "known_affected": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-2976", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650584", "CSAFPID-1650835", "CSAFPID-1650506", "CSAFPID-1650515", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-342816", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816361", "CSAFPID-764813", "CSAFPID-220643", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-89587", "CSAFPID-1673397", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-345049", "CSAFPID-816801", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764250", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-2976" }, { "cve": "CVE-2023-4043", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "other", "text": "Excessive Iteration", "title": "CWE-834" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673405", "CSAFPID-1673397", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-4043" }, { "cve": "CVE-2023-4759", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4759", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4759.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673397", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-4759" }, { "cve": "CVE-2023-4863", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4863.json" } ], "title": "CVE-2023-4863" }, { "cve": "CVE-2023-5072", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5072.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650575", "CSAFPID-1650515", "CSAFPID-1650835", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-5072" }, { "cve": "CVE-2023-26031", "cwe": { "id": "CWE-426", "name": "Untrusted Search Path" }, "notes": [ { "category": "other", "text": "Untrusted Search Path", "title": "CWE-426" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26031.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-26031" }, { "cve": "CVE-2023-26551", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26551", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26551.json" } ], "scores": [ { "cvss_v3": { "baseScore": 0.0, "baseSeverity": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26551" }, { "cve": "CVE-2023-26552", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26552", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26552.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26552" }, { "cve": "CVE-2023-26553", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26553.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26553" }, { "cve": "CVE-2023-26554", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26554.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26554" }, { "cve": "CVE-2023-26555", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-26555", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26555.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-26555" }, { "cve": "CVE-2023-28484", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-28484", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28484.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-220886", "CSAFPID-816317", "CSAFPID-764813", "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-28484" }, { "cve": "CVE-2023-29469", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-29469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29469.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-611417", "CSAFPID-764731", "CSAFPID-764732", "CSAFPID-764733", "CSAFPID-816317", "CSAFPID-89587", "CSAFPID-220886", "CSAFPID-342816", "CSAFPID-345049", "CSAFPID-764752", "CSAFPID-611390", "CSAFPID-611394", "CSAFPID-764764", "CSAFPID-764765", "CSAFPID-764766", "CSAFPID-764767", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764250", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-29469" }, { "cve": "CVE-2023-33201", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-33201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-764250", "CSAFPID-611394", "CSAFPID-1650584", "CSAFPID-1673397", "CSAFPID-912561", "CSAFPID-345049", "CSAFPID-611390", "CSAFPID-611417", "CSAFPID-764274", "CSAFPID-764275", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-33201" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "other", "text": "Improper Certificate Validation", "title": "CWE-295" }, { "category": "other", "text": "Insufficient Verification of Data Authenticity", "title": "CWE-345" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] }, "references": [ { "category": "self", "summary": "CVE-2023-37920", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-39410", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] }, "references": [ { "category": "self", "summary": "CVE-2023-39410", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-39410.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673404", "CSAFPID-1673384", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871" ] } ], "title": "CVE-2023-39410" }, { "cve": "CVE-2023-44487", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44487", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-816361", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503603", "CSAFPID-1503575", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-44487" }, { "cve": "CVE-2023-44981", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "notes": [ { "category": "other", "text": "Authorization Bypass Through User-Controlled Key", "title": "CWE-639" } ], "product_status": { "known_affected": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] }, "references": [ { "category": "self", "summary": "CVE-2023-44981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44981.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650515", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601" ] } ], "title": "CVE-2023-44981" }, { "cve": "CVE-2023-45288", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-45288", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45288.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-45288" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650757", "CSAFPID-1650758", "CSAFPID-1650767", "CSAFPID-1650759", "CSAFPID-1650760", "CSAFPID-1650761", "CSAFPID-89587", "CSAFPID-220643", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-764250", "CSAFPID-764813", "CSAFPID-816317", "CSAFPID-816361", "CSAFPID-816798", "CSAFPID-816799", "CSAFPID-816800", "CSAFPID-816801", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-816852", "CSAFPID-816853", "CSAFPID-816854", "CSAFPID-816855", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-816870", "CSAFPID-816871", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-1503603", "CSAFPID-1503612", "CSAFPID-1503575", "CSAFPID-1503640", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-49083", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-49083", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49083.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-49083" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-304", "name": "Missing Critical Step in Authentication" }, "notes": [ { "category": "other", "text": "Missing Critical Step in Authentication", "title": "CWE-304" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51384", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51384.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2023-51385", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51385.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-52425", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52425" }, { "cve": "CVE-2023-52426", "cwe": { "id": "CWE-776", "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)" }, "notes": [ { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2023-52426" }, { "cve": "CVE-2024-1874", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-1874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-1874" }, { "cve": "CVE-2024-2408", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "other", "text": "Covert Timing Channel", "title": "CWE-385" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2408", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2408.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-2408" }, { "cve": "CVE-2024-2511", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improperly Controlled Sequential Memory Allocation", "title": "CWE-1325" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2511", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2511.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-2511" }, { "cve": "CVE-2024-4577", "cwe": { "id": "CWE-88", "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4577", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-4577" }, { "cve": "CVE-2024-4603", "cwe": { "id": "CWE-606", "name": "Unchecked Input for Loop Condition" }, "notes": [ { "category": "other", "text": "Unchecked Input for Loop Condition", "title": "CWE-606" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4603", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4603" }, { "cve": "CVE-2024-4741", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-4741", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-4741" }, { "cve": "CVE-2024-5458", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5458.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5458" }, { "cve": "CVE-2024-5535", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5535", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-5535" }, { "cve": "CVE-2024-5585", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" }, { "category": "other", "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "title": "CWE-78" }, { "category": "other", "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "title": "CWE-88" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-5585", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-5585" }, { "cve": "CVE-2024-6119", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" } ], "product_status": { "known_affected": [ "CSAFPID-1673508", "CSAFPID-1673525" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6119", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673508", "CSAFPID-1673525" ] } ], "title": "CVE-2024-6119" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-7264", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] }, "references": [ { "category": "self", "summary": "CVE-2024-7264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673529", "CSAFPID-1673479", "CSAFPID-1673511", "CSAFPID-1673512" ] } ], "title": "CVE-2024-7264" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-21131", "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21131.json" } ], "title": "CVE-2024-21131" }, { "cve": "CVE-2024-21138", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21138.json" } ], "title": "CVE-2024-21138" }, { "cve": "CVE-2024-21140", "product_status": { "known_affected": [ "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21140.json" } ], "title": "CVE-2024-21140" }, { "cve": "CVE-2024-21144", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21144.json" } ], "title": "CVE-2024-21144" }, { "cve": "CVE-2024-21145", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503299", "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21145.json" } ], "title": "CVE-2024-21145" }, { "cve": "CVE-2024-21147", "product_status": { "known_affected": [ "CSAFPID-1503306", "CSAFPID-1503302", "CSAFPID-1503299", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21147.json" } ], "title": "CVE-2024-21147" }, { "cve": "CVE-2024-21233", "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21233.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-21233" }, { "cve": "CVE-2024-21242", "product_status": { "known_affected": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673443", "CSAFPID-1673444", "CSAFPID-1673445" ] } ], "title": "CVE-2024-21242" }, { "cve": "CVE-2024-21251", "product_status": { "known_affected": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21251", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21251.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673450", "CSAFPID-1673451", "CSAFPID-1673452" ] } ], "title": "CVE-2024-21251" }, { "cve": "CVE-2024-21261", "product_status": { "known_affected": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21261.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673144", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-21261" }, { "cve": "CVE-2024-22018", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22018", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22018.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22018" }, { "cve": "CVE-2024-22020", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22020", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-22020" }, { "cve": "CVE-2024-22201", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-22201" }, { "cve": "CVE-2024-23807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23807", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650831", "CSAFPID-1650825", "CSAFPID-1673479", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23807" }, { "cve": "CVE-2024-23944", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23944", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23944.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-23944" }, { "cve": "CVE-2024-24989", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24989.json" } ], "title": "CVE-2024-24989" }, { "cve": "CVE-2024-24990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-24990", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24990.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-24990" }, { "cve": "CVE-2024-25710", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-25710", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-342816", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-912046", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-25710" }, { "cve": "CVE-2024-26130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816798", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26130" }, { "cve": "CVE-2024-26308", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-26308", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1673384", "CSAFPID-816871", "CSAFPID-816798", "CSAFPID-342816", "CSAFPID-764275", "CSAFPID-764752", "CSAFPID-816801", "CSAFPID-816846", "CSAFPID-912044", "CSAFPID-912045", "CSAFPID-912046", "CSAFPID-912561", "CSAFPID-912567", "CSAFPID-912600", "CSAFPID-912601", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-816845", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-26308" }, { "cve": "CVE-2024-27983", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27983", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27983.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-27983" }, { "cve": "CVE-2024-28182", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Detection of Error Condition Without Action", "title": "CWE-390" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673442", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28182" }, { "cve": "CVE-2024-28849", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28849", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-89587", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-28849" }, { "cve": "CVE-2024-28887", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28887", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28887.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-28887" }, { "cve": "CVE-2024-29025", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673488", "CSAFPID-1673489", "CSAFPID-1673491", "CSAFPID-1673492", "CSAFPID-1673493", "CSAFPID-1673495", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29025" }, { "cve": "CVE-2024-29131", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29131" }, { "cve": "CVE-2024-29133", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] }, "references": [ { "category": "self", "summary": "CVE-2024-29133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1673497", "CSAFPID-1673397", "CSAFPID-1673384", "CSAFPID-1503575", "CSAFPID-1503603", "CSAFPID-764250", "CSAFPID-1503612", "CSAFPID-1503640", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-816846", "CSAFPID-1503299", "CSAFPID-1503302", "CSAFPID-1503306", "CSAFPID-1503661", "CSAFPID-1503663", "CSAFPID-764813" ] } ], "title": "CVE-2024-29133" }, { "cve": "CVE-2024-31079", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-31079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-31079" }, { "cve": "CVE-2024-32760", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-32760", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-32760" }, { "cve": "CVE-2024-34161", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "other", "text": "Missing Release of Memory after Effective Lifetime", "title": "CWE-401" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34161.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-34161" }, { "cve": "CVE-2024-34750", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Handling of Exceptional Conditions", "title": "CWE-755" }, { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1673504", "CSAFPID-1673506" ] }, "references": [ { "category": "self", "summary": "CVE-2024-34750", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673504", "CSAFPID-1673506" ] } ], "title": "CVE-2024-34750" }, { "cve": "CVE-2024-35200", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35200.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-35200" }, { "cve": "CVE-2024-36137", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "other", "text": "Incorrect Permission Assignment for Critical Resource", "title": "CWE-732" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36137.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-36137" }, { "cve": "CVE-2024-36138", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "title": "CWE-77" } ], "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36138.json" } ], "title": "CVE-2024-36138" }, { "cve": "CVE-2024-36387", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-36387", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36387.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-36387" }, { "cve": "CVE-2024-37370", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37370", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37370" }, { "cve": "CVE-2024-37371", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37371", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673507", "CSAFPID-1673508", "CSAFPID-1673509" ] } ], "title": "CVE-2024-37371" }, { "cve": "CVE-2024-37372", "product_status": { "known_affected": [ "CSAFPID-89587" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37372", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37372.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-89587" ] } ], "title": "CVE-2024-37372" }, { "cve": "CVE-2024-38356", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38356", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38356.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38356" }, { "cve": "CVE-2024-38357", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38357", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38357.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673510", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38357" }, { "cve": "CVE-2024-38472", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38472", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38472.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38472" }, { "cve": "CVE-2024-38473", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38473", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38473.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38473" }, { "cve": "CVE-2024-38474", "cwe": { "id": "CWE-172", "name": "Encoding Error" }, "notes": [ { "category": "other", "text": "Encoding Error", "title": "CWE-172" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38474", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38474.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38474" }, { "cve": "CVE-2024-38475", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Encoding or Escaping of Output", "title": "CWE-116" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38475", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38475" }, { "cve": "CVE-2024-38476", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Inclusion of Functionality from Untrusted Control Sphere", "title": "CWE-829" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38476", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38476" }, { "cve": "CVE-2024-38477", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38477", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38477.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-38477" }, { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673511", "CSAFPID-1673512", "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-39573", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39573", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39573.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39573" }, { "cve": "CVE-2024-39884", "cwe": { "id": "CWE-18", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-18", "title": "CWE-18" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39884", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39884.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-39884" }, { "cve": "CVE-2024-40725", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40725", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40725.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40725" }, { "cve": "CVE-2024-40898", "cwe": { "id": "CWE-918", "name": "Server-Side Request Forgery (SSRF)" }, "notes": [ { "category": "other", "text": "Server-Side Request Forgery (SSRF)", "title": "CWE-918" } ], "product_status": { "known_affected": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40898", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-345049", "CSAFPID-611417", "CSAFPID-1673479" ] } ], "title": "CVE-2024-40898" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1673385", "CSAFPID-1673442", "CSAFPID-1673386" ] } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45801", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2024-45801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2024-45801" } ] }
pysec-2023-135
Vulnerability from pysec
Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. These are in the process of being removed from Mozilla's trust store. e-Tugra's root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems.
Name | purl | certifi | pkg:pypi/certifi |
---|
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "certifi", "purl": "pkg:pypi/certifi" }, "ranges": [ { "events": [ { "introduced": "2015.4.28" }, { "fixed": "2023.7.22" } ], "type": "ECOSYSTEM" } ], "versions": [ "2015.04.28", "2015.11.20", "2015.11.20.1", "2015.9.6", "2015.9.6.1", "2015.9.6.2", "2016.2.28", "2016.8.2", "2016.8.31", "2016.8.8", "2016.9.26", "2017.1.23", "2017.11.5", "2017.4.17", "2017.7.27", "2017.7.27.1", "2018.1.18", "2018.10.15", "2018.11.29", "2018.4.16", "2018.8.13", "2018.8.24", "2019.11.28", "2019.3.9", "2019.6.16", "2019.9.11", "2020.11.8", "2020.12.5", "2020.4.5", "2020.4.5.1", "2020.4.5.2", "2020.6.20", "2021.10.8", "2021.5.30", "2022.12.7", "2022.5.18", "2022.5.18.1", "2022.6.15", "2022.6.15.1", "2022.6.15.2", "2022.9.14", "2022.9.24", "2023.5.7" ] } ], "aliases": [ "CVE-2023-37920", "GHSA-xqr8-7jwr-rhp7" ], "details": "Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store. These are in the process of being removed from Mozilla\u0027s trust store. e-Tugra\u0027s root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems.", "id": "PYSEC-2023-135", "modified": "2023-08-07T05:41:30.977938+00:00", "published": "2023-08-03T19:36:12+00:00", "references": [ { "type": "WEB", "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "type": "WEB", "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "type": "ADVISORY", "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" } ] }
gsd-2023-37920
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2023-37920", "id": "GSD-2023-37920" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-37920" ], "details": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.", "id": "GSD-2023-37920", "modified": "2023-12-13T01:20:24.714028Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-37920", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "python-certifi", "version": { "version_data": [ { "version_affected": "=", "version_value": "\u003e= 2015.04.28, \u003c 2023.07.22" } ] } } ] }, "vendor_name": "certifi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store." } ] }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-345", "lang": "eng", "value": "CWE-345: Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7", "refsource": "MISC", "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "name": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909", "refsource": "MISC", "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "name": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A", "refsource": "MISC", "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" } ] }, "source": { "advisory": "GHSA-xqr8-7jwr-rhp7", "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003e=2015.04.28,\u003c2023.07.22", "affected_versions": "All versions starting from 2015.04.28 before 2023.07.22", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-345", "CWE-937" ], "date": "2023-08-12", "description": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.", "fixed_versions": [], "identifier": "CVE-2023-37920", "identifiers": [ "CVE-2023-37920", "GHSA-xqr8-7jwr-rhp7" ], "not_impacted": "", "package_slug": "pypi/certifi", "pubdate": "2023-07-25", "solution": "Unfortunately, there is no solution available yet.", "title": "Insufficient Verification of Data Authenticity", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2023-37920", "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A", "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7", "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" ], "uuid": "df27d981-01e7-43a6-80ce-c5a3c8a93dee" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:kennethreitz:certifi:*:*:*:*:*:python:*:*", "cpe_name": [], "versionEndExcluding": "2023.07.22", "versionStartIncluding": "2015.04.28", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2023-37920" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-345" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "name": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "name": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/", "refsource": "MISC", "tags": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-08-12T06:16Z", "publishedDate": "2023-07-25T21:15Z" } } }
ssa-806742
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SCALANCE XCM-/XRM-300 before V2.4 is affected by multiple vulnerabilities.\n\nSiemens has released an update for SCALANCE X-300 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-806742.html" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-806742.json" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-806742.pdf" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-806742.txt" } ], "title": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4", "tracking": { "current_release_date": "2024-02-13T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-806742", "initial_release_date": "2024-02-13T00:00:00Z", "revision_history": [ { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2EC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6GK5324-8TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6GK5332-0GA01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2ER3" ] } } } ], "category": "product_name", "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)", "product_id": "6", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)", "product_id": "7", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)", "product_id": "8", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)", "product_id": "9", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)", "product_id": "10", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)", "product_id": "11", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2006-20001" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2021-3445", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "summary", "text": "A flaw was found in libdnf\u0027s signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-3445" }, { "cve": "CVE-2021-3638", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-3638" }, { "cve": "CVE-2021-4037", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-4037" }, { "cve": "CVE-2021-36369", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-36369" }, { "cve": "CVE-2021-43666", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password\u0027s length is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-43666" }, { "cve": "CVE-2021-45451", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-45451" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-1348", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-1348" }, { "cve": "CVE-2022-2586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-2880" }, { "cve": "CVE-2022-3294", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server\u0027s private network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3294" }, { "cve": "CVE-2022-3437", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3437" }, { "cve": "CVE-2022-3515", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3515" }, { "cve": "CVE-2022-4415", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4743", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4743" }, { "cve": "CVE-2022-4744", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2022-4900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4900" }, { "cve": "CVE-2022-4904", "cwe": { "id": "CWE-1284", "name": "Improper Validation of Specified Quantity in Input" }, "notes": [ { "category": "summary", "text": "A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4904" }, { "cve": "CVE-2022-23471", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "containerd is an open source container runtime. A bug was found in containerd\u0027s CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user\u0027s process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd\u0027s CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-23521" }, { "cve": "CVE-2022-24834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-24834" }, { "cve": "CVE-2022-26691", "cwe": { "id": "CWE-697", "name": "Incorrect Comparison" }, "notes": [ { "category": "summary", "text": "A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-26691" }, { "cve": "CVE-2022-28737", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There\u0027s a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28737" }, { "cve": "CVE-2022-28738", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28738" }, { "cve": "CVE-2022-28739", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28739" }, { "cve": "CVE-2022-29154", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29154" }, { "cve": "CVE-2022-29162", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container\u0027s bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "cwe": { "id": "CWE-282", "name": "Improper Ownership Management" }, "notes": [ { "category": "summary", "text": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29187" }, { "cve": "CVE-2022-29536", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephy_string_shorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29536" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-32148" }, { "cve": "CVE-2022-34903", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim\u0027s keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-34903" }, { "cve": "CVE-2022-34918", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-36021", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36021" }, { "cve": "CVE-2022-36227", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36760", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37436", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "notes": [ { "category": "summary", "text": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-37797", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37797" }, { "cve": "CVE-2022-38725", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-38725" }, { "cve": "CVE-2022-39189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-39189" }, { "cve": "CVE-2022-39260", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git\u0027s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-39260" }, { "cve": "CVE-2022-41409", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41409" }, { "cve": "CVE-2022-41556", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41556" }, { "cve": "CVE-2022-41715", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41860", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the server will try to look that option up in the internal dictionaries. This lookup will fail, but the SIM code will not check for that failure. Instead, it will dereference a NULL pointer, and cause the server to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41860" }, { "cve": "CVE-2022-41861", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41861" }, { "cve": "CVE-2022-41862", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41862" }, { "cve": "CVE-2022-41903", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41903" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-44370", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-44370" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45142", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45142" }, { "cve": "CVE-2022-45919", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-46392", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-46392" }, { "cve": "CVE-2022-46393", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX \u003e 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-46393" }, { "cve": "CVE-2022-47629", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48434", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-48434" }, { "cve": "CVE-2023-0160", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A deadlock flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to potentially crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0160" }, { "cve": "CVE-2023-0330", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0330" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0494", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0494" }, { "cve": "CVE-2023-0567", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0568", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0662", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0662" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-1380", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1393", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1393" }, { "cve": "CVE-2023-1611", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1838", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1838" }, { "cve": "CVE-2023-1855", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1859", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1859" }, { "cve": "CVE-2023-1989", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1990" }, { "cve": "CVE-2023-2002", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2002" }, { "cve": "CVE-2023-2124", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2194", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s SLIMpro I2C device driver. The userspace \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2194" }, { "cve": "CVE-2023-2269", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2269" }, { "cve": "CVE-2023-2861", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2861" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3006", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "notes": [ { "category": "summary", "text": "A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim\u0027s hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3006" }, { "cve": "CVE-2023-3090", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb-\u003ecb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3111", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3111" }, { "cve": "CVE-2023-3141", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3247", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client\u0027s nonce.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3247" }, { "cve": "CVE-2023-3268", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3268" }, { "cve": "CVE-2023-3301", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3301" }, { "cve": "CVE-2023-3316", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3316" }, { "cve": "CVE-2023-3390", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3390" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3776", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3863", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3863" }, { "cve": "CVE-2023-4128", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4194", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-20593", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21255", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-21255" }, { "cve": "CVE-2023-22490", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim\u0027s filesystem within the malicious repository\u0027s working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.\n\nA fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22742", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "summary", "text": "libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2\u0027s `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22742" }, { "cve": "CVE-2023-22745", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22745" }, { "cve": "CVE-2023-23454", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23931", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23931" }, { "cve": "CVE-2023-23934", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Werkzeug is a comprehensive WSGI web application library. Browsers may allow \"nameless\" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23934" }, { "cve": "CVE-2023-23946", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24538", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-24538" }, { "cve": "CVE-2023-25153", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25155", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25155" }, { "cve": "CVE-2023-25193", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger quadratic growth via consecutive marks during the process of looking back for base glyphs when attaching marks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25588", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25588" }, { "cve": "CVE-2023-25690", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\r\n\r\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. \r\n\r\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25727", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25727" }, { "cve": "CVE-2023-26081", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-26081" }, { "cve": "CVE-2023-26965", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-26965" }, { "cve": "CVE-2023-27522", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27522" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-28450", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28450" }, { "cve": "CVE-2023-28466", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-28486", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "Sudo before 1.9.13 does not escape control characters in log messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "Sudo before 1.9.13 does not escape control characters in sudoreplay output.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28487" }, { "cve": "CVE-2023-29402", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29404", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29405" }, { "cve": "CVE-2023-29406", "cwe": { "id": "CWE-436", "name": "Interpretation Conflict" }, "notes": [ { "category": "summary", "text": "The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29409" }, { "cve": "CVE-2023-30086", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30086" }, { "cve": "CVE-2023-30456", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30456" }, { "cve": "CVE-2023-30772", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-31124", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31124" }, { "cve": "CVE-2023-31130", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular \"0::00:00:00/2\" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31130" }, { "cve": "CVE-2023-31147", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31147" }, { "cve": "CVE-2023-31436", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31489", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31489" }, { "cve": "CVE-2023-32067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32233", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32233" }, { "cve": "CVE-2023-32573", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32573" }, { "cve": "CVE-2023-33203", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-33203" }, { "cve": "CVE-2023-34256", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34256" }, { "cve": "CVE-2023-34872", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34872" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35788" }, { "cve": "CVE-2023-35789", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35789" }, { "cve": "CVE-2023-35823", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35823" }, { "cve": "CVE-2023-35824", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35824" }, { "cve": "CVE-2023-35828", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35828" }, { "cve": "CVE-2023-36054", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36054" }, { "cve": "CVE-2023-36617", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36617" }, { "cve": "CVE-2023-36664", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36664" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-38559", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-38559" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-40283" } ] }
fkie_cve-2023-37920
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909 | Patch | |
security-advisories@github.com | https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7 | Vendor Advisory | |
security-advisories@github.com | https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A | Mailing List, Third Party Advisory | |
security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/ | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/ | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20240912-0002/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
certifi | certifi | * | |
fedoraproject | fedora | 38 | |
netapp | active_iq_unified_manager | - | |
netapp | active_iq_unified_manager | - | |
netapp | management_services_for_element_software | - | |
netapp | management_services_for_netapp_hci | - | |
netapp | ontap_mediator | - | |
netapp | ontap_select_deploy_administration_utility | - | |
netapp | solidfire_\&_hci_storage_node | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:certifi:certifi:*:*:*:*:*:python:*:*", "matchCriteriaId": "2FF2392F-9661-448D-BE25-4AD98BD5D808", "versionEndExcluding": "2023.7.22", "versionStartIncluding": "2015.4.28", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*", "matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*", "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*", "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_mediator:-:*:*:*:*:*:*:*", "matchCriteriaId": "19DD87DA-6999-4B38-B953-BEC49760F2BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\\u0026_hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D452B464-1200-4B72-9A89-42DC58486191", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store." } ], "id": "CVE-2023-37920", "lastModified": "2025-02-13T13:50:15.813", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-25T21:15:10.827", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20240912-0002/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-xqr8-7jwr-rhp7
Vulnerability from github
Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store. These are in the process of being removed from Mozilla's trust store.
e-Tugra's root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems. Conclusions of Mozilla's investigation can be found here.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "certifi" }, "ranges": [ { "events": [ { "introduced": "2015.4.28" }, { "fixed": "2023.7.22" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2023-37920" ], "database_specific": { "cwe_ids": [ "CWE-345" ], "github_reviewed": true, "github_reviewed_at": "2023-07-25T14:43:53Z", "nvd_published_at": "2023-07-25T21:15:10Z", "severity": "HIGH" }, "details": "Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store. These are in the process of being removed from Mozilla\u0027s trust store.\n\n e-Tugra\u0027s root certificates are being removed pursuant to an investigation prompted by reporting of security issues in their systems. Conclusions of Mozilla\u0027s investigation can be found [here](https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A).", "id": "GHSA-xqr8-7jwr-rhp7", "modified": "2025-02-12T21:33:44Z", "published": "2023-07-25T14:43:53Z", "references": [ { "type": "WEB", "url": "https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920" }, { "type": "WEB", "url": "https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909" }, { "type": "PACKAGE", "url": "https://github.com/certifi/python-certifi" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml" }, { "type": "WEB", "url": "https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20240912-0002" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Removal of e-Tugra root certificate" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.