Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-45336 (GCVE-0-2024-45336)
Vulnerability from cvelistv5
Published
2025-01-28 01:03
Modified
2025-02-21 18:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Go standard library | net/http |
Version: 0 ≤ Version: 1.23.0-0 ≤ Version: 1.24.0-0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-45336", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T14:56:59.058895Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:16:38.044Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-02-21T18:03:31.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20250221-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "net/http", "product": "net/http", "programRoutines": [ { "name": "Client.do" }, { "name": "Client.makeHeadersCopier" }, { "name": "shouldCopyHeaderOnRedirect" }, { "name": "Client.Do" }, { "name": "Client.Get" }, { "name": "Client.Head" }, { "name": "Client.Post" }, { "name": "Client.PostForm" }, { "name": "Get" }, { "name": "Head" }, { "name": "Post" }, { "name": "PostForm" } ], "vendor": "Go standard library", "versions": [ { "lessThan": "1.22.11", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "1.23.5", "status": "affected", "version": "1.23.0-0", "versionType": "semver" }, { "lessThan": "1.24.0-rc.2", "status": "affected", "version": "1.24.0-0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "Kyle Seely" } ], "descriptions": [ { "lang": "en", "value": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-116: Improper Encoding or Escaping of Output", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-30T19:14:21.805Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/cl/643100" }, { "url": "https://go.dev/issue/70530" }, { "url": "https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ" }, { "url": "https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ" }, { "url": "https://pkg.go.dev/vuln/GO-2025-3420" } ], "title": "Sensitive headers incorrectly sent after cross-domain redirect in net/http" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2024-45336", "datePublished": "2025-01-28T01:03:24.869Z", "dateReserved": "2024-08-27T19:41:58.555Z", "dateUpdated": "2025-02-21T18:03:31.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-45336\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-01-28T02:15:28.807\",\"lastModified\":\"2025-02-21T18:15:17.400\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.\"},{\"lang\":\"es\",\"value\":\"El cliente HTTP descarta los encabezados confidenciales despu\u00e9s de seguir una redirecci\u00f3n entre dominios. Por ejemplo, una solicitud a a.com/ que contiene un encabezado de autorizaci\u00f3n que se redirige a b.com/ no enviar\u00e1 ese encabezado a b.com. Sin embargo, en el caso de que el cliente reciba una redirecci\u00f3n posterior al mismo dominio, los encabezados confidenciales se restaurar\u00e1n. Por ejemplo, una cadena de redirecciones desde a.com/, a b.com/1 y, finalmente, a b.com/2 enviar\u00eda incorrectamente el encabezado de autorizaci\u00f3n a b.com/2.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"references\":[{\"url\":\"https://go.dev/cl/643100\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/70530\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-3420\",\"source\":\"security@golang.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250221-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250221-0003/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-02-21T18:03:31.299Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-45336\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-28T14:56:59.058895Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-28T14:47:08.108Z\"}}], \"cna\": {\"title\": \"Sensitive headers incorrectly sent after cross-domain redirect in net/http\", \"credits\": [{\"lang\": \"en\", \"value\": \"Kyle Seely\"}], \"affected\": [{\"vendor\": \"Go standard library\", \"product\": \"net/http\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.22.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.23.0-0\", \"lessThan\": \"1.23.5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"1.24.0-0\", \"lessThan\": \"1.24.0-rc.2\", \"versionType\": \"semver\"}], \"packageName\": \"net/http\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Client.do\"}, {\"name\": \"Client.makeHeadersCopier\"}, {\"name\": \"shouldCopyHeaderOnRedirect\"}, {\"name\": \"Client.Do\"}, {\"name\": \"Client.Get\"}, {\"name\": \"Client.Head\"}, {\"name\": \"Client.Post\"}, {\"name\": \"Client.PostForm\"}, {\"name\": \"Get\"}, {\"name\": \"Head\"}, {\"name\": \"Post\"}, {\"name\": \"PostForm\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/643100\"}, {\"url\": \"https://go.dev/issue/70530\"}, {\"url\": \"https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ\"}, {\"url\": \"https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-3420\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-116: Improper Encoding or Escaping of Output\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-01-30T19:14:21.805Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-45336\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-21T18:03:31.299Z\", \"dateReserved\": \"2024-08-27T19:41:58.555Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-01-28T01:03:24.869Z\", \"assignerShortName\": \"Go\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2025:3131
Vulnerability from csaf_redhat
Published
2025-03-26 17:39
Modified
2025-08-14 03:14
Summary
Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.4
Notes
Topic
Logging for Red Hat OpenShift - 6.1.4
Details
Logging for Red Hat OpenShift - 6.1.4
logging-loki-container: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338 )
cluster-logging-operator-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
lokistack-gateway-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
opa-openshift-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
lokistack-gateway-container: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Logging for Red Hat OpenShift - 6.1.4", "title": "Topic" }, { "category": "general", "text": "Logging for Red Hat OpenShift - 6.1.4\nlogging-loki-container: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338 )\ncluster-logging-operator-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nlokistack-gateway-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nopa-openshift-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\nlokistack-gateway-container: Go JOSE\u0027s Parsing Vulnerable to Denial of Service (CVE-2025-27144)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3131", "url": "https://access.redhat.com/errata/RHSA-2025:3131" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2333122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "LOG-6623", "url": "https://issues.redhat.com/browse/LOG-6623" }, { "category": "external", "summary": "LOG-6797", "url": "https://issues.redhat.com/browse/LOG-6797" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3131.json" } ], "title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.1.4", "tracking": { "current_release_date": "2025-08-14T03:14:21+00:00", "generator": { "date": "2025-08-14T03:14:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3131", "initial_release_date": "2025-03-26T17:39:24+00:00", "revision_history": [ { "date": "2025-03-26T17:39:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-03-26T17:39:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:14:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOL 6.1 for RHEL 9", "product": { "name": "RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:6.1::el9" } } } ], "category": "product_family", "name": "logging for Red Hat OpenShift" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "product": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "product": { "name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "product_id": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "product": { "name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "product_id": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64", "product": { "name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64", "product_id": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "product": { "name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "product_id": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "product": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "product": { "name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "product_id": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "product": { "name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "product_id": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "product": { "name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "product_id": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "product": { "name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "product_id": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "product": { "name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "product_id": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "product": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "product": { "name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "product_id": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v6.1.4-10" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "product": { "name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "product_id": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "product": { "name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "product_id": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "product": { "name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "product_id": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34" } } }, { "category": "product_version", "name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "product": { "name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "product_id": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v6.1.4-13" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "product": { "name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "product_id": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "product": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "product": { "name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "product_id": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "product_id": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator\u0026tag=v6.1.4-5" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "product_id": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9\u0026tag=v1.1.0-337" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "product": { "name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "product_id": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel9\u0026tag=v0.4.0-356" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "product": { "name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "product_id": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel9\u0026tag=v3.4.2-6" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "product": { "name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "product_id": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "product_identification_helper": { "purl": "pkg:oci/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel9\u0026tag=v0.37.1-34" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "product": { "name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "product_id": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "product_identification_helper": { "purl": "pkg:oci/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel9-operator\u0026tag=v6.1.4-7" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "product": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "product_id": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel9\u0026tag=v0.1.0-752" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "product": { "name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "product_id": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel9\u0026tag=v0.1.0-369" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64" }, "product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64" }, "product_reference": "openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x" }, "product_reference": "openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le" }, "product_reference": "openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64" }, "product_reference": "openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64" }, "product_reference": "openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le" }, "product_reference": "openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x" }, "product_reference": "openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64" }, "product_reference": "openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64" }, "product_reference": "openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le" }, "product_reference": "openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64" }, "product_reference": "openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64" }, "product_reference": "openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x" }, "product_reference": "openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x" }, "product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le" }, "product_reference": "openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le" }, "product_reference": "openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64" }, "product_reference": "openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64" }, "product_reference": "openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x" }, "product_reference": "openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le" }, "product_reference": "openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x" }, "product_reference": "openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64" }, "product_reference": "openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "relates_to_product_reference": "9Base-RHOL-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64 as a component of RHOL 6.1 for RHEL 9", "product_id": "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" }, "product_reference": "openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64", "relates_to_product_reference": "9Base-RHOL-6.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-26T17:39:24+00:00", "details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html", "product_ids": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-45338", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2024-12-18T21:00:59.938173+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333122" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang.org/x/net/html. This flaw allows an attacker to craft input to the parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This issue can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can craft malicious input that causes the parsing functions to process data non-linearly, resulting in significant delays which leads to a denial of service by exhausting system resources.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45338" }, { "category": "external", "summary": "RHBZ#2333122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333122" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45338", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45338" }, { "category": "external", "summary": "https://go.dev/cl/637536", "url": "https://go.dev/cl/637536" }, { "category": "external", "summary": "https://go.dev/issue/70906", "url": "https://go.dev/issue/70906" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ", "url": "https://groups.google.com/g/golang-announce/c/wSCRmFnNmPA/m/Lvcd0mRMAwAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3333", "url": "https://pkg.go.dev/vuln/GO-2024-3333" } ], "release_date": "2024-12-18T20:38:22.660000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-26T17:39:24+00:00", "details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html", "product_ids": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3131" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html" }, { "cve": "CVE-2025-27144", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-24T23:00:42.448432+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2347423" } ], "notes": [ { "category": "description", "text": "A flaw was found in GO-JOSE. In affected versions, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code uses strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. This issue could be exploied by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-27144" }, { "category": "external", "summary": "RHBZ#2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-27144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22", "url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5", "url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78" } ], "release_date": "2025-02-24T22:22:22.863000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-26T17:39:24+00:00", "details": "For OpenShift Container Platform 4.17 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.17/release_notes/ocp-4-17-release-notes.html\n\nFor Red Hat OpenShift Logging 6.1, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.17/observability/logging/logging-6.1/log6x-upgrading-to-6.html", "product_ids": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3131" }, { "category": "workaround", "details": "As a workaround, applications can pre-validate that payloads being passed to Go JOSE do not contain an excessive number of `.` characters.", "product_ids": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHOL-6.1:openshift-logging/cluster-logging-operator-bundle@sha256:2ac22e0a4469dbd521e501f94aed9d6f6cfd42c380295fccda70845e624cc344_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:083dad5f886c60ea9660d32e0afd171395363b6734530e68ee7b1a59a83c4c0f_amd64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:8027ebaf481eebf1d9b3d0eee35d0f8390ba0aecbc6e2ee06f88043c46340aa8_arm64", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:97252762d4350b97b2bbe65454c52163a925a2c0fc57b2b8bf22ac272cb566cf_ppc64le", "9Base-RHOL-6.1:openshift-logging/cluster-logging-rhel9-operator@sha256:fafc296b1270eb068157cccb039599c1159cab5e149b45acf0da57e3a04e7b36_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:0fffb013cc90701c6ab5d6995e5626f897c6902e3a1c2990db8d15dab0807d88_arm64", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:5aff59a0f93149b6f22f79556ab034ac5d383674d1bc2bb3d15e795e607f6fe4_s390x", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:63d9b83da2752c6fa9a4764afca3e98b82265d0157714eb0e8f4d31351d135f5_ppc64le", "9Base-RHOL-6.1:openshift-logging/eventrouter-rhel9@sha256:7b986827ecb1f0014ced0cd8bcdf5db0b2522bd2743e7c76eddedf0846428070_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:648290626590d1bf3401882dcf1e0ae0bc783fa422267ae9f769ecb179ddfe00_amd64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a4511102e85d0f6bd2197429d782e47a856024082bf819ba51a9f3dd1106c151_arm64", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:a9d55d6c654c1fce9b78ba99b7031a11ff8db470113ad0d86e52e0113d117dab_ppc64le", "9Base-RHOL-6.1:openshift-logging/log-file-metric-exporter-rhel9@sha256:d2fb75d3c1bfdf061631dffa7113d6410f0fdd9773abd496b91281713489ab45_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:13ad9cfbb796c1a10f3a4cb371e674e6609b7b7d245aca5e5863b508c8f219f6_arm64", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:51b6e56d97ba3744ad9e4a34cd11d44a9e6ac76314225171e4806e42a361c773_ppc64le", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:70c70a6eca66d45832f976fe062780cdea17a90ccc34e2e7b380767a375ff1e8_s390x", "9Base-RHOL-6.1:openshift-logging/logging-loki-rhel9@sha256:af9aa36d2fdf2ca882bac401ac5caff5241b1ae42c1fff0f8cffcd3e8a00a6f2_amd64", "9Base-RHOL-6.1:openshift-logging/loki-operator-bundle@sha256:6caabb4a166da0c3922e78030e6370cb82b923bd1e80ea2be39d7f9f35ace840_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:1a0ec1a067b407ba7e48e4aeadb0c9a087e0baa0cb36c23361ac65d16426f10c_ppc64le", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:80a8d28b9a04a24139f8b3886c2ef6ab4f27bb6f14b3890f224f7d1ac6379472_amd64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:8df1c6e06cd17e3015c7530fea2312aeff1a9fc3b1ed5317611961cb661487eb_arm64", "9Base-RHOL-6.1:openshift-logging/loki-rhel9-operator@sha256:cd655287a3a3dd0540e36df230c0c2cdeabbc8d61a6be64c70bb515da9ff0a3f_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:83bcc8176e1171bbbcca67f26c31a9c991dc706f7ed44c1618cb82187414054f_arm64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:8ce642fc6ba84abec046ec4d37e6ae11b841978148d6548c972f93374ef11bec_s390x", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:d33dabeb04dc31d194efcec83667928a33481d7bf7086365b9672c1cd150faa3_amd64", "9Base-RHOL-6.1:openshift-logging/lokistack-gateway-rhel9@sha256:f39bc6a61714802f42aa4c32242d6f0b6ccd416300421bcb5a09d23aba39ee36_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:2f9ef3a999a0a3677293a4673a5f13ee1e52ad8b010c36098a5fd8db2ba3e932_ppc64le", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:70ae585e1ae9622b593e4a6cb6505ed918cd564db748526ef0175d984c063028_amd64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:b49acfeb63ac8dee78ab577b5243a8eb63835f6268384503c1253b53953dc313_arm64", "9Base-RHOL-6.1:openshift-logging/opa-openshift-rhel9@sha256:c19b42a324d049b71a09f3979b8718220166279ae4f135dc339813d15e2082f6_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:0e1f8896fe6abb6f8d6961b4a390205e001877e7621c78f305e08c7d97235f5e_ppc64le", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:6230e301464371370926ab703049b57f54fa6a1e551ed3b962670415ea08ebaf_s390x", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cccff902663f34e08ae0bd837bd518fa35fa6a91f822b354923e089bd5a24b53_amd64", "9Base-RHOL-6.1:openshift-logging/vector-rhel9@sha256:cf81df3a0c88ec07bb3f4ac9bd9c8fb41aaea1ab3e24eb9449aa58b5910d2f3b_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service" } ] }
rhsa-2025:3773
Vulnerability from csaf_redhat
Published
2025-04-10 01:04
Modified
2025-08-14 03:16
Summary
Red Hat Security Advisory: delve and golang security update
Notes
Topic
An update for delve and golang is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Go Programming Language.
Security Fix(es):
* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for delve and golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Go Programming Language.\n\nSecurity Fix(es):\n\n* encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3773", "url": "https://access.redhat.com/errata/RHSA-2025:3773" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3773.json" } ], "title": "Red Hat Security Advisory: delve and golang security update", "tracking": { "current_release_date": "2025-08-14T03:16:53+00:00", "generator": { "date": "2025-08-14T03:16:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3773", "initial_release_date": "2025-04-10T01:04:23+00:00", "revision_history": [ { "date": "2025-04-10T01:04:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-10T01:04:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:16:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.6-2.el9_5.aarch64", "product": { "name": "go-toolset-0:1.23.6-2.el9_5.aarch64", "product_id": "go-toolset-0:1.23.6-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.23.6-2.el9_5.aarch64", "product": { "name": "golang-0:1.23.6-2.el9_5.aarch64", "product_id": "golang-0:1.23.6-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-2.el9_5.aarch64", "product": { "name": "golang-bin-0:1.23.6-2.el9_5.aarch64", "product_id": "golang-bin-0:1.23.6-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "golang-race-0:1.23.6-2.el9_5.aarch64", "product": { "name": "golang-race-0:1.23.6-2.el9_5.aarch64", "product_id": "golang-race-0:1.23.6-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.23.6-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "delve-0:1.24.1-2.el9_5.aarch64", "product": { "name": "delve-0:1.24.1-2.el9_5.aarch64", "product_id": "delve-0:1.24.1-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-2.el9_5.aarch64", "product": { "name": "delve-debugsource-0:1.24.1-2.el9_5.aarch64", "product_id": "delve-debugsource-0:1.24.1-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-2.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "product": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "product_id": "delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-2.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.6-2.el9_5.ppc64le", "product": { "name": "go-toolset-0:1.23.6-2.el9_5.ppc64le", "product_id": "go-toolset-0:1.23.6-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.23.6-2.el9_5.ppc64le", "product": { "name": "golang-0:1.23.6-2.el9_5.ppc64le", "product_id": "golang-0:1.23.6-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-2.el9_5.ppc64le", "product": { "name": "golang-bin-0:1.23.6-2.el9_5.ppc64le", "product_id": "golang-bin-0:1.23.6-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-race-0:1.23.6-2.el9_5.ppc64le", "product": { "name": "golang-race-0:1.23.6-2.el9_5.ppc64le", "product_id": "golang-race-0:1.23.6-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.23.6-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-0:1.24.1-2.el9_5.ppc64le", "product": { "name": "delve-0:1.24.1-2.el9_5.ppc64le", "product_id": "delve-0:1.24.1-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "product": { "name": "delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "product_id": "delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-2.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "product": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "product_id": "delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-2.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.6-2.el9_5.x86_64", "product": { "name": "go-toolset-0:1.23.6-2.el9_5.x86_64", "product_id": "go-toolset-0:1.23.6-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.23.6-2.el9_5.x86_64", "product": { "name": "golang-0:1.23.6-2.el9_5.x86_64", "product_id": "golang-0:1.23.6-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-2.el9_5.x86_64", "product": { "name": "golang-bin-0:1.23.6-2.el9_5.x86_64", "product_id": "golang-bin-0:1.23.6-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.23.6-2.el9_5.x86_64", "product": { "name": "golang-race-0:1.23.6-2.el9_5.x86_64", "product_id": "golang-race-0:1.23.6-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.23.6-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "delve-0:1.24.1-2.el9_5.x86_64", "product": { "name": "delve-0:1.24.1-2.el9_5.x86_64", "product_id": "delve-0:1.24.1-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-2.el9_5.x86_64", "product": { "name": "delve-debugsource-0:1.24.1-2.el9_5.x86_64", "product_id": "delve-debugsource-0:1.24.1-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-2.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "product": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "product_id": "delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-2.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.6-2.el9_5.s390x", "product": { "name": "go-toolset-0:1.23.6-2.el9_5.s390x", "product_id": "go-toolset-0:1.23.6-2.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-2.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.23.6-2.el9_5.s390x", "product": { "name": "golang-0:1.23.6-2.el9_5.s390x", "product_id": "golang-0:1.23.6-2.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-2.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-2.el9_5.s390x", "product": { "name": "golang-bin-0:1.23.6-2.el9_5.s390x", "product_id": "golang-bin-0:1.23.6-2.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-2.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "golang-race-0:1.23.6-2.el9_5.s390x", "product": { "name": "golang-race-0:1.23.6-2.el9_5.s390x", "product_id": "golang-race-0:1.23.6-2.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.23.6-2.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.23.6-2.el9_5.src", "product": { "name": "golang-0:1.23.6-2.el9_5.src", "product_id": "golang-0:1.23.6-2.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-2.el9_5?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.24.1-2.el9_5.src", "product": { "name": "delve-0:1.24.1-2.el9_5.src", "product_id": "delve-0:1.24.1-2.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-2.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.23.6-2.el9_5.noarch", "product": { "name": "golang-docs-0:1.23.6-2.el9_5.noarch", "product_id": "golang-docs-0:1.23.6-2.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.23.6-2.el9_5?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.23.6-2.el9_5.noarch", "product": { "name": "golang-misc-0:1.23.6-2.el9_5.noarch", "product_id": "golang-misc-0:1.23.6-2.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.23.6-2.el9_5?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.23.6-2.el9_5.noarch", "product": { "name": "golang-src-0:1.23.6-2.el9_5.noarch", "product_id": "golang-src-0:1.23.6-2.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.23.6-2.el9_5?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.23.6-2.el9_5.noarch", "product": { "name": "golang-tests-0:1.23.6-2.el9_5.noarch", "product_id": "golang-tests-0:1.23.6-2.el9_5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.23.6-2.el9_5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64" }, "product_reference": "delve-0:1.24.1-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le" }, "product_reference": "delve-0:1.24.1-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-2.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src" }, "product_reference": "delve-0:1.24.1-2.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64" }, "product_reference": "delve-0:1.24.1-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64" }, "product_reference": "delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le" }, "product_reference": "delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64" }, "product_reference": "delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64" }, "product_reference": "delve-debugsource-0:1.24.1-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le" }, "product_reference": "delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64" }, "product_reference": "delve-debugsource-0:1.24.1-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64" }, "product_reference": "go-toolset-0:1.23.6-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le" }, "product_reference": "go-toolset-0:1.23.6-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x" }, "product_reference": "go-toolset-0:1.23.6-2.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64" }, "product_reference": "go-toolset-0:1.23.6-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64" }, "product_reference": "golang-0:1.23.6-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le" }, "product_reference": "golang-0:1.23.6-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x" }, "product_reference": "golang-0:1.23.6-2.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-2.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src" }, "product_reference": "golang-0:1.23.6-2.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64" }, "product_reference": "golang-0:1.23.6-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64" }, "product_reference": "golang-bin-0:1.23.6-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le" }, "product_reference": "golang-bin-0:1.23.6-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x" }, "product_reference": "golang-bin-0:1.23.6-2.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64" }, "product_reference": "golang-bin-0:1.23.6-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.23.6-2.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch" }, "product_reference": "golang-docs-0:1.23.6-2.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.23.6-2.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch" }, "product_reference": "golang-misc-0:1.23.6-2.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.23.6-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64" }, "product_reference": "golang-race-0:1.23.6-2.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.23.6-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le" }, "product_reference": "golang-race-0:1.23.6-2.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.23.6-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x" }, "product_reference": "golang-race-0:1.23.6-2.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.23.6-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64" }, "product_reference": "golang-race-0:1.23.6-2.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.23.6-2.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch" }, "product_reference": "golang-src-0:1.23.6-2.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.23.6-2.el9_5.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" }, "product_reference": "golang-tests-0:1.23.6-2.el9_5.noarch", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-34156", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2024-09-06T21:20:09.377905+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2310528" } ], "notes": [ { "category": "description", "text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.", "title": "Vulnerability description" }, { "category": "summary", "text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-34156" }, { "category": "external", "summary": "RHBZ#2310528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156" }, { "category": "external", "summary": "https://go.dev/cl/611239", "url": "https://go.dev/cl/611239" }, { "category": "external", "summary": "https://go.dev/issue/69139", "url": "https://go.dev/issue/69139" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk", "url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-3106", "url": "https://pkg.go.dev/vuln/GO-2024-3106" } ], "release_date": "2024-09-06T21:15:12.020000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:04:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3773" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion" }, { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:04:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3773" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-45341", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2025-01-23T12:26:31.454000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341750" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "RHBZ#2341750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:04:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3773" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:04:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3773" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:delve-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debuginfo-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:delve-debugsource-0:1.24.1-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:go-toolset-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.src", "AppStream-9.5.0.Z.MAIN:golang-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-bin-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-docs-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-misc-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:golang-race-0:1.23.6-2.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:golang-src-0:1.23.6-2.el9_5.noarch", "AppStream-9.5.0.Z.MAIN:golang-tests-0:1.23.6-2.el9_5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
rhsa-2025:3335
Vulnerability from csaf_redhat
Published
2025-03-27 15:00
Modified
2025-08-14 09:11
Summary
Red Hat Security Advisory: opentelemetry-collector security update
Notes
Topic
An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Collector with the supported components for a Red Hat build of OpenTelemetry
Security Fix(es):
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Collector with the supported components for a Red Hat build of OpenTelemetry\n\nSecurity Fix(es):\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\n* go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service (CVE-2025-27144)\n\n* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)\n\n* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3335", "url": "https://access.redhat.com/errata/RHSA-2025:3335" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "2352914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3335.json" } ], "title": "Red Hat Security Advisory: opentelemetry-collector security update", "tracking": { "current_release_date": "2025-08-14T09:11:49+00:00", "generator": { "date": "2025-08-14T09:11:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3335", "initial_release_date": "2025-03-27T15:00:22+00:00", "revision_history": [ { "date": "2025-03-27T15:00:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-03-27T15:00:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T09:11:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-8.el9_5.src", "product": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.src", "product_id": "opentelemetry-collector-0:0.107.0-8.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "product": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "product_id": "opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "product": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "product_id": "opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-8.el9_5.x86_64", "product": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.x86_64", "product_id": "opentelemetry-collector-0:0.107.0-8.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "product": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "product_id": "opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-8.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64" }, "product_reference": "opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le" }, "product_reference": "opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x" }, "product_reference": "opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src" }, "product_reference": "opentelemetry-collector-0:0.107.0-8.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-8.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" }, "product_reference": "opentelemetry-collector-0:0.107.0-8.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-27T15:00:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3335" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "acknowledgments": [ { "names": [ "jub0bs" ] } ], "cve": "CVE-2025-22868", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2025-02-26T04:00:44.350024+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348366" } ], "notes": [ { "category": "description", "text": "A flaw was found in the `golang.org/x/oauth2/jws` package in the token parsing component. This vulnerability is made possible because of the use of `strings.Split(token, \".\")` to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22868" }, { "category": "external", "summary": "RHBZ#2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868" }, { "category": "external", "summary": "https://go.dev/cl/652155", "url": "https://go.dev/cl/652155" }, { "category": "external", "summary": "https://go.dev/issue/71490", "url": "https://go.dev/issue/71490" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3488", "url": "https://pkg.go.dev/vuln/GO-2025-3488" } ], "release_date": "2025-02-26T03:07:49.012000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-27T15:00:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3335" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to pre-validate any payloads passed to `go-jose` to check that they do not contain an excessive amount of `.` characters.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws" }, { "cve": "CVE-2025-27144", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-24T23:00:42.448432+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2347423" } ], "notes": [ { "category": "description", "text": "A flaw was found in GO-JOSE. In affected versions, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code uses strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. This issue could be exploied by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-27144" }, { "category": "external", "summary": "RHBZ#2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-27144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22", "url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5", "url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78" } ], "release_date": "2025-02-24T22:22:22.863000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-27T15:00:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3335" }, { "category": "workaround", "details": "As a workaround, applications can pre-validate that payloads being passed to Go JOSE do not contain an excessive number of `.` characters.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service" }, { "cve": "CVE-2025-29786", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-03-17T14:00:59.078419+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2352914" } ], "notes": [ { "category": "description", "text": "A flaw was found in Expr. This vulnerability allows excessive memory usage and potential out-of-memory (OOM) crashes via unbounded input strings, where a malicious or inadvertent large expression can cause the parser to construct an extremely large Abstract Syntax Tree (AST), consuming excessive memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-29786" }, { "category": "external", "summary": "RHBZ#2352914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-29786", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786" }, { "category": "external", "summary": "https://github.com/expr-lang/expr/pull/762", "url": "https://github.com/expr-lang/expr/pull/762" }, { "category": "external", "summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2", "url": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2" } ], "release_date": "2025-03-17T13:15:32.836000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-27T15:00:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3335" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to impose an input size restriction before parsing (i.e. validating or limiting the length of expression strings that the application will accept). Ensuring no unbounded-length expressions are fed into the parser will prevent the parser from constructing a very large AST and avoid the potential memory exhaustion issue.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.src", "AppStream-9.5.0.Z.MAIN:opentelemetry-collector-0:0.107.0-8.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input" } ] }
rhsa-2025:3593
Vulnerability from csaf_redhat
Published
2025-04-03 13:38
Modified
2025-08-14 09:11
Summary
Red Hat Security Advisory: opentelemetry-collector security update
Notes
Topic
An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Collector with the supported components for a Red Hat build of OpenTelemetry
Security Fix(es):
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* go-jose: Go JOSE's Parsing Vulnerable to Denial of Service (CVE-2025-27144)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)
* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for opentelemetry-collector is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Collector with the supported components for a Red Hat build of OpenTelemetry\n\nSecurity Fix(es):\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\n* go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service (CVE-2025-27144)\n\n* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws (CVE-2025-22868)\n\n* github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input (CVE-2025-29786)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3593", "url": "https://access.redhat.com/errata/RHSA-2025:3593" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "2352914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3593.json" } ], "title": "Red Hat Security Advisory: opentelemetry-collector security update", "tracking": { "current_release_date": "2025-08-14T09:11:16+00:00", "generator": { "date": "2025-08-14T09:11:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3593", "initial_release_date": "2025-04-03T13:38:52+00:00", "revision_history": [ { "date": "2025-04-03T13:38:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-03T13:38:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T09:11:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-7.el9_4.src", "product": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.src", "product_id": "opentelemetry-collector-0:0.107.0-7.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "product": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "product_id": "opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "product": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "product_id": "opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-7.el9_4.x86_64", "product": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.x86_64", "product_id": "opentelemetry-collector-0:0.107.0-7.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "product": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "product_id": "opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/opentelemetry-collector@0.107.0-7.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64" }, "product_reference": "opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le" }, "product_reference": "opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x" }, "product_reference": "opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src" }, "product_reference": "opentelemetry-collector-0:0.107.0-7.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "opentelemetry-collector-0:0.107.0-7.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)", "product_id": "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" }, "product_reference": "opentelemetry-collector-0:0.107.0-7.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-03T13:38:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3593" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "acknowledgments": [ { "names": [ "jub0bs" ] } ], "cve": "CVE-2025-22868", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2025-02-26T04:00:44.350024+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348366" } ], "notes": [ { "category": "description", "text": "A flaw was found in the `golang.org/x/oauth2/jws` package in the token parsing component. This vulnerability is made possible because of the use of `strings.Split(token, \".\")` to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22868" }, { "category": "external", "summary": "RHBZ#2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868" }, { "category": "external", "summary": "https://go.dev/cl/652155", "url": "https://go.dev/cl/652155" }, { "category": "external", "summary": "https://go.dev/issue/71490", "url": "https://go.dev/issue/71490" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3488", "url": "https://pkg.go.dev/vuln/GO-2025-3488" } ], "release_date": "2025-02-26T03:07:49.012000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-03T13:38:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3593" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to pre-validate any payloads passed to `go-jose` to check that they do not contain an excessive amount of `.` characters.", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws" }, { "cve": "CVE-2025-27144", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-24T23:00:42.448432+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2347423" } ], "notes": [ { "category": "description", "text": "A flaw was found in GO-JOSE. In affected versions, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code uses strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. This issue could be exploied by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-27144" }, { "category": "external", "summary": "RHBZ#2347423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-27144", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27144" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22", "url": "https://github.com/go-jose/go-jose/commit/99b346cec4e86d102284642c5dcbe9bb0cacfc22" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5", "url": "https://github.com/go-jose/go-jose/releases/tag/v4.0.5" }, { "category": "external", "summary": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78", "url": "https://github.com/go-jose/go-jose/security/advisories/GHSA-c6gw-w398-hv78" } ], "release_date": "2025-02-24T22:22:22.863000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-03T13:38:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3593" }, { "category": "workaround", "details": "As a workaround, applications can pre-validate that payloads being passed to Go JOSE do not contain an excessive number of `.` characters.", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-jose: Go JOSE\u0027s Parsing Vulnerable to Denial of Service" }, { "cve": "CVE-2025-29786", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-03-17T14:00:59.078419+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2352914" } ], "notes": [ { "category": "description", "text": "A flaw was found in Expr. This vulnerability allows excessive memory usage and potential out-of-memory (OOM) crashes via unbounded input strings, where a malicious or inadvertent large expression can cause the parser to construct an extremely large Abstract Syntax Tree (AST), consuming excessive memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-29786" }, { "category": "external", "summary": "RHBZ#2352914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2352914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-29786", "url": "https://www.cve.org/CVERecord?id=CVE-2025-29786" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-29786" }, { "category": "external", "summary": "https://github.com/expr-lang/expr/pull/762", "url": "https://github.com/expr-lang/expr/pull/762" }, { "category": "external", "summary": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2", "url": "https://github.com/expr-lang/expr/security/advisories/GHSA-93mq-9ffx-83m2" } ], "release_date": "2025-03-17T13:15:32.836000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-03T13:38:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3593" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to impose an input size restriction before parsing (i.e. validating or limiting the length of expression strings that the application will accept). Ensuring no unbounded-length expressions are fed into the parser will prevent the parser from constructing a very large AST and avoid the potential memory exhaustion issue.", "product_ids": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.aarch64", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.ppc64le", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.s390x", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.src", "AppStream-9.4.0.Z.EUS:opentelemetry-collector-0:0.107.0-7.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "github.com/expr-lang/expr: Memory Exhaustion in Expr Parser with Unrestricted Input" } ] }
rhsa-2025:7326
Vulnerability from csaf_redhat
Published
2025-05-13 08:44
Modified
2025-08-14 03:17
Summary
Red Hat Security Advisory: rhc security update
Notes
Topic
An update for rhc is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.
Security Fix(es):
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.\n\nSecurity Fix(es):\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\n* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:7326", "url": "https://access.redhat.com/errata/RHSA-2025:7326" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.6_release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "RHEL-53958", "url": "https://issues.redhat.com/browse/RHEL-53958" }, { "category": "external", "summary": "RHEL-59506", "url": "https://issues.redhat.com/browse/RHEL-59506" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7326.json" } ], "title": "Red Hat Security Advisory: rhc security update", "tracking": { "current_release_date": "2025-08-14T03:17:16+00:00", "generator": { "date": "2025-08-14T03:17:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:7326", "initial_release_date": "2025-05-13T08:44:22+00:00", "revision_history": [ { "date": "2025-05-13T08:44:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T08:44:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:17:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rhc-devel-1:0.2.6-3.el9_6.aarch64", "product": { "name": "rhc-devel-1:0.2.6-3.el9_6.aarch64", "product_id": "rhc-devel-1:0.2.6-3.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-devel@0.2.6-3.el9_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "product": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "product_id": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.2.6-3.el9_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "product": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "product_id": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.6-3.el9_6?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-1:0.2.6-3.el9_6.aarch64", "product": { "name": "rhc-1:0.2.6-3.el9_6.aarch64", "product_id": "rhc-1:0.2.6-3.el9_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.2.6-3.el9_6?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rhc-devel-1:0.2.6-3.el9_6.ppc64le", "product": { "name": "rhc-devel-1:0.2.6-3.el9_6.ppc64le", "product_id": "rhc-devel-1:0.2.6-3.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-devel@0.2.6-3.el9_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "product": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "product_id": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.2.6-3.el9_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "product": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "product_id": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.6-3.el9_6?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-1:0.2.6-3.el9_6.ppc64le", "product": { "name": "rhc-1:0.2.6-3.el9_6.ppc64le", "product_id": "rhc-1:0.2.6-3.el9_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.2.6-3.el9_6?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhc-devel-1:0.2.6-3.el9_6.x86_64", "product": { "name": "rhc-devel-1:0.2.6-3.el9_6.x86_64", "product_id": "rhc-devel-1:0.2.6-3.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-devel@0.2.6-3.el9_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "product": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "product_id": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.2.6-3.el9_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "product": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "product_id": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.6-3.el9_6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-1:0.2.6-3.el9_6.x86_64", "product": { "name": "rhc-1:0.2.6-3.el9_6.x86_64", "product_id": "rhc-1:0.2.6-3.el9_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.2.6-3.el9_6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rhc-devel-1:0.2.6-3.el9_6.s390x", "product": { "name": "rhc-devel-1:0.2.6-3.el9_6.s390x", "product_id": "rhc-devel-1:0.2.6-3.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-devel@0.2.6-3.el9_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.2.6-3.el9_6.s390x", "product": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.s390x", "product_id": "rhc-debugsource-1:0.2.6-3.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.2.6-3.el9_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "product": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "product_id": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.2.6-3.el9_6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-1:0.2.6-3.el9_6.s390x", "product": { "name": "rhc-1:0.2.6-3.el9_6.s390x", "product_id": "rhc-1:0.2.6-3.el9_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.2.6-3.el9_6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.2.6-3.el9_6.src", "product": { "name": "rhc-1:0.2.6-3.el9_6.src", "product_id": "rhc-1:0.2.6-3.el9_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.2.6-3.el9_6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src" }, "product_reference": "rhc-1:0.2.6-3.el9_6.src", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "AppStream-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src" }, "product_reference": "rhc-1:0.2.6-3.el9_6.src", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.aarch64", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.ppc64le", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.s390x", "relates_to_product_reference": "CRB-9.6.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-devel-1:0.2.6-3.el9_6.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" }, "product_reference": "rhc-devel-1:0.2.6-3.el9_6.x86_64", "relates_to_product_reference": "CRB-9.6.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T08:44:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7326" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T08:44:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7326" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "AppStream-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "AppStream-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.src", "CRB-9.6.0.GA:rhc-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debuginfo-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-debugsource-1:0.2.6-3.el9_6.x86_64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.aarch64", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.ppc64le", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.s390x", "CRB-9.6.0.GA:rhc-devel-1:0.2.6-3.el9_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
rhsa-2025:7592
Vulnerability from csaf_redhat
Published
2025-05-14 11:52
Modified
2025-08-14 03:17
Summary
Red Hat Security Advisory: yggdrasil security update
Notes
Topic
An update for yggdrasil is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child "worker" process, exchanging data with its worker processes through a D-Bus message broker.
Security Fix(es):
* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for yggdrasil is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "yggdrasil is a system daemon that subscribes to topics on an MQTT broker and routes any data received on the topics to an appropriate child \"worker\" process, exchanging data with its worker processes through a D-Bus message broker.\n\nSecurity Fix(es):\n\n* yggdrasil: Local privilege escalation in yggdrasil (CVE-2025-3931)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:7592", "url": "https://access.redhat.com/errata/RHSA-2025:7592" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2362345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362345" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7592.json" } ], "title": "Red Hat Security Advisory: yggdrasil security update", "tracking": { "current_release_date": "2025-08-14T03:17:12+00:00", "generator": { "date": "2025-08-14T03:17:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:7592", "initial_release_date": "2025-05-14T11:52:59+00:00", "revision_history": [ { "date": "2025-05-14T11:52:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-14T11:52:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:17:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product": { "name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "yggdrasil-0:0.4.5-3.el10_0.src", "product": { "name": "yggdrasil-0:0.4.5-3.el10_0.src", "product_id": "yggdrasil-0:0.4.5-3.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil@0.4.5-3.el10_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "yggdrasil-0:0.4.5-3.el10_0.aarch64", "product": { "name": "yggdrasil-0:0.4.5-3.el10_0.aarch64", "product_id": "yggdrasil-0:0.4.5-3.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil@0.4.5-3.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "product": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "product_id": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.5-3.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "product": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "product_id": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.5-3.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "product": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "product_id": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.5-3.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "product": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "product_id": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.5-3.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "yggdrasil-0:0.4.5-3.el10_0.ppc64le", "product": { "name": "yggdrasil-0:0.4.5-3.el10_0.ppc64le", "product_id": "yggdrasil-0:0.4.5-3.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil@0.4.5-3.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "product": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "product_id": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.5-3.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product_id": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.5-3.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product_id": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.5-3.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "product": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "product_id": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.5-3.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "yggdrasil-0:0.4.5-3.el10_0.x86_64", "product": { "name": "yggdrasil-0:0.4.5-3.el10_0.x86_64", "product_id": "yggdrasil-0:0.4.5-3.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil@0.4.5-3.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "product": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "product_id": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.5-3.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "product": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "product_id": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.5-3.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "product": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "product_id": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.5-3.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "product": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "product_id": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.5-3.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "yggdrasil-0:0.4.5-3.el10_0.s390x", "product": { "name": "yggdrasil-0:0.4.5-3.el10_0.s390x", "product_id": "yggdrasil-0:0.4.5-3.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil@0.4.5-3.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "product": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "product_id": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debugsource@0.4.5-3.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "product": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "product_id": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-debuginfo@0.4.5-3.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "product": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "product_id": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-examples-debuginfo@0.4.5-3.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "product": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "product_id": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/yggdrasil-devel@0.4.5-3.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.src", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "relates_to_product_reference": "CRB-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)", "product_id": "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" }, "product_reference": "yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "relates_to_product_reference": "CRB-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-14T11:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7592" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "acknowledgments": [ { "names": [ "Thibault Guittet" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2025-3931", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2025-04-25T17:06:52.161000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362345" } ], "notes": [ { "category": "description", "text": "A flaw was found in Yggdrasil, which acts as a system broker, allowing the processes to communicate to other children\u0027s \"worker\" processes through the DBus component. Yggdrasil creates a DBus method to dispatch messages to workers. However, it misses authentication and authorization checks, allowing every system user to call it. One available Yggdrasil worker acts as a package manager with capabilities to create and enable new repositories and install or remove packages. \n\nThis flaw allows an attacker with access to the system to leverage the lack of authentication on the dispatch message to force the Yggdrasil worker to install arbitrary RPM packages. This issue results in local privilege escalation, enabling the attacker to access and modify sensitive system data.", "title": "Vulnerability description" }, { "category": "summary", "text": "yggdrasil: Local privilege escalation in yggdrasil", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability qualifies as Important rather than Moderate due to its direct violation of privilege boundaries and its broad post-install attack surface. The core issue lies in the com.redhat.Yggdrasil1.Dispatch() method being exposed over the system DBus without any authentication or authorization, enabling any local unprivileged user to interface with a privileged backend (package-manager worker). By leveraging this unprotected method, an attacker can install arbitrary software, execute payloads, and gain full root access, thus achieving a complete Local Privilege Escalation (LPE). While exploitation requires local access, the flaw exists in a default service path (rhc connect) recommended during system registration, increasing its exposure. Furthermore, the ability to manipulate package installation flows \u2014 a highly privileged operation \u2014 indicates a severe trust boundary violation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-3931" }, { "category": "external", "summary": "RHBZ#2362345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-3931", "url": "https://www.cve.org/CVERecord?id=CVE-2025-3931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-3931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-3931" }, { "category": "external", "summary": "https://github.com/RedHatInsights/yggdrasil/pull/336", "url": "https://github.com/RedHatInsights/yggdrasil/pull/336" } ], "release_date": "2025-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-14T11:52:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7592" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "AppStream-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "AppStream-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.src", "CRB-10.0.Z:yggdrasil-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debuginfo-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-debugsource-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-devel-0:0.4.5-3.el10_0.x86_64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.aarch64", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.ppc64le", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.s390x", "CRB-10.0.Z:yggdrasil-examples-debuginfo-0:0.4.5-3.el10_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "yggdrasil: Local privilege escalation in yggdrasil" } ] }
rhsa-2025:3922
Vulnerability from csaf_redhat
Published
2025-04-15 17:24
Modified
2025-08-14 03:16
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.10
Notes
Topic
Red Hat OpenShift Service Mesh Containers for 2.5.10
This update has a security impact of Moderate. A Common Vulnerability Scoring
System (CVSS) base score, which gives a detailed severity rating, is available
for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service
mesh project, tailored for installation into an OpenShift Container Platform
installation.
Security Fix(es):
* openshift-istio-kiali-rhel8-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* openshift-istio-kiali-rhel8-container: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh Containers for 2.5.10\n\nThis update has a security impact of Moderate. A Common Vulnerability Scoring\nSystem (CVSS) base score, which gives a detailed severity rating, is available\nfor each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service\nmesh project, tailored for installation into an OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* openshift-istio-kiali-rhel8-container: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n* openshift-istio-kiali-rhel8-container: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3922", "url": "https://access.redhat.com/errata/RHSA-2025:3922" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3922.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.10", "tracking": { "current_release_date": "2025-08-14T03:16:23+00:00", "generator": { "date": "2025-08-14T03:16:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3922", "initial_release_date": "2025-04-15T17:24:31+00:00", "revision_history": [ { "date": "2025-04-15T17:24:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-15T17:24:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:16:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOSSM 2.5 for RHEL 8", "product": { "name": "RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "product": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "product_id": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8\u0026tag=1.73.18-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.73.20-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.5.10-6" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.5.10-5" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "product": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "product_id": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8\u0026tag=1.73.18-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.73.20-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.5.10-6" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.5.10-5" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "product": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "product_id": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8\u0026tag=1.73.18-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.73.20-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.5.10-6" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.5.10-5" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "product": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "product_id": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "product_identification_helper": { "purl": "pkg:oci/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-ossmc-rhel8\u0026tag=1.73.18-3" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.73.20-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.5.10-5" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.5.10-6" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af?arch=arm64\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.5.10-5" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x" }, "product_reference": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64" }, "product_reference": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64" }, "product_reference": "openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "relates_to_product_reference": "8Base-RHOSSM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64 as a component of RHOSSM 2.5 for RHEL 8", "product_id": "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64", "relates_to_product_reference": "8Base-RHOSSM-2.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le" ], "known_not_affected": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-15T17:24:31+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le" ], "known_not_affected": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-15T17:24:31+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3922" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:4ca2cc3742e64531273fc1b35511fffe352e65a5527ae041c7bf2075f5b29911_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:b26108c4cef97feb0ae24c1e8339d7bde1713970b784849ca1215b7715d9787c_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:c5d07b8b521b72c1f894dd24c6828dd36d19390917f5bc2667eea4a7dac041fa_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/grafana-rhel8@sha256:d5dbb543c850a8e1e3906b612726833716f456b62a4011b1f8dab9cd22c59c01_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:3b92a8c34e3a06bdd1434cadbdb841ec1826a1500da693cfe7e8824142370e14_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:69d4c2058d655572e30311736a9c8d375a106d6bb5aacd79ef7446ab56709563_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:ce581d6ca8b4a780b9725c794cb20e86b944a346babffa2c06189d6b712335f2_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/istio-cni-rhel8@sha256:eee7614663e691a38b9aeb9a3d24edaeab8c14aca913c4a4590f879e94c4f149_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:13dcb4d7d8a4cb0b9d558e5d109ada4edbdd4010d02b684706f5710a141fcc8f_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:30059f1449c3397fa40946efa91ab009be4d56dda97116e471f62495d94f9446_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:5bfcc66f0dcaa577496389ba4a9d768c8d7e2b23dab37e8a654b23e55b4196de_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-ossmc-rhel8@sha256:e7631c53bc0aeb4756aec062bc2af6b6dc10d866c527cda043cb29352e912315_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:84e1ef5d6a8b2819886e931a3571b9d011fe78c1eeb833698fe2097c3a686470_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:c415dd0b81e26dbcc2b8d03aff026e02c04d0145dd2fed95a4f48802d8aa422d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:d1915eb9104878a80d8dabe2d94d08fb05ebb2fd8f98eeac5db583c6a8523654_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/kiali-rhel8@sha256:f808b2e9c12c0380686af71f5a87b39f611be4a694523d65ca87479a8f105c96_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:0dbfe58c19fed17005e091d3f436c9929eabd9749befa3631848121ddabe011f_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:a88a232308fc41065171f1bc00d2732c3f3f20316017fa9756335d4bef9e0a9d_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:bde8c5073241fad487f3f649913cf7de45c5d9752038060e5fa068b11509c521_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/pilot-rhel8@sha256:f0a183a03e2a2159b7f4de429e64da43fe3ea8baa58aa5582177d8809f55d259_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:59b5667d37aa167350f70d8d4c353c00bb5948dc82aab6860a49989f85bdbf86_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:5dd12b1fd952bd8cb68a387a290a8d72ea7b148d37c2901df8f347193a0b7e42_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7e56a2232e872992d9445fd40347c92801d32b215c3ecb73ae9667ff6931108a_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/proxyv2-rhel8@sha256:7f3779207257346928fb1fc887eb53a7bcc1036068497c34081511274ab16693_arm64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:15ca7df31562c1b3941f2d626566dd9e0fb7f6d6f250eb18ff4588c669b6fb34_amd64", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:43dd45558fabc8c174a15cfee660494dab76f324472c5a3ac58377c66b212b91_ppc64le", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:80de017468569ad56c876902347a5210259ea37768d68926fc26c247ed57c415_s390x", "8Base-RHOSSM-2.5:openshift-service-mesh/ratelimit-rhel8@sha256:95ffba5e1be1911ebaa7e29b7af35a2fc1f6e42deaf09d28ce5af3663b9179af_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
rhsa-2025:4667
Vulnerability from csaf_redhat
Published
2025-05-07 12:55
Modified
2025-08-14 03:16
Summary
Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog.
Notes
Topic
Updated rhceph-7.1 container image is now available in the Red Hat Ecosystem Catalog.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
This new container image is based on Red Hat Ceph Storage 7.1 and Red Hat Enterprise Linux 9.5, 9.4, 8.10.
Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:
https://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes
All users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated rhceph-7.1 container image is now available in the Red Hat Ecosystem Catalog.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services. \n \nThis new container image is based on Red Hat Ceph Storage 7.1 and Red Hat Enterprise Linux 9.5, 9.4, 8.10. \n \nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://docs.redhat.com/en/documentation/red_hat_ceph_storage/7/html/7.1_release_notes\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4667", "url": "https://access.redhat.com/errata/RHSA-2025:4667" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4667.json" } ], "title": "Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog.", "tracking": { "current_release_date": "2025-08-14T03:16:47+00:00", "generator": { "date": "2025-08-14T03:16:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:4667", "initial_release_date": "2025-05-07T12:55:17+00:00", "revision_history": [ { "date": "2025-05-07T12:55:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-07T12:55:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:16:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 7.1 Tools", "product": { "name": "Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:7.1::el9" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "product": { "name": "rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "product_id": "rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=latest-1746621761" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "product": { "name": "rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "product_id": "rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-1746621568" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-21" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "product_id": "rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-1746621558" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64", "product_id": "rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-1746621536" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "product": { "name": "rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "product_id": "rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=latest-1746621761" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "product": { "name": "rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "product_id": "rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-1746621568" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-21" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "product_id": "rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-1746621558" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "product_id": "rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-1746621536" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "product": { "name": "rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "product_id": "rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/grafana-rhel9\u0026tag=latest-1746621761" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "product": { "name": "rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "product_id": "rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.8-1746621568" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v3.0.0-21" } } }, { "category": "product_version", "name": "rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "product": { "name": "rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "product_id": "rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-7-rhel9\u0026tag=latest" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.22-1746621558" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "product_id": "rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-1746621536" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64" }, "product_reference": "rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x" }, "product_reference": "rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le" }, "product_reference": "rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x" }, "product_reference": "rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64" }, "product_reference": "rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le" }, "product_reference": "rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64" }, "product_reference": "rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64 as a component of Red Hat Ceph Storage 7.1 Tools", "product_id": "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64", "relates_to_product_reference": "9Base-RHCEPH-7.1-Tools" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-24790", "cwe": { "id": "CWE-115", "name": "Misinterpretation of Input" }, "discovery_date": "2024-06-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2292787" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Go language standard library net/netip. The method Is*() (IsPrivate(), IsPublic(), etc) doesn\u0027t behave properly when working with IPv6 mapped to IPv4 addresses. The unexpected behavior can lead to integrity and confidentiality issues, specifically when these methods are used to control access to resources or data.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses", "title": "Vulnerability summary" }, { "category": "other", "text": "This CVE has been marked as moderate as for our products a network-based attack vector is simply impossible when it comes to golang code,apart from that as per CVE flaw analysis reported by golang, this only affects integrity and confidentiality and has no effect on availability, hence CVSS has been marked as such.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-115: Misinterpretation of Input vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nControls such as input validation and error handling mitigate input misinterpretation risks by enforcing strict validation rules and secure error management. Error handling ensures inputs are validated against predefined formats, preventing malformed data from being misinterpreted. Techniques like strong typing, allow listing, and proper encoding reduce the likelihood of injection attacks and unintended code execution. Input validation also ensures that errors do not expose sensitive system details or cause unpredictable behavior. Secure error handling prevents information leakage through detailed error messages while preserving system stability under malformed input conditions. Together, these controls reduce the attack surface by maintaining consistent input processing and preventing exploitable system states, strengthening the overall security posture.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-24790" }, { "category": "external", "summary": "RHBZ#2292787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2292787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-24790", "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-24790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24790" } ], "release_date": "2024-06-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T12:55:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2789521\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4667" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses" }, { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T12:55:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2789521\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4667" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T12:55:17+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2789521\n\nFor supported configurations, refer to:\n\nhttps://access.redhat.com/articles/1548993", "product_ids": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4667" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:1acdd9584f131b9931ec44b41d2c661b956abfb341560a1e3cd33c6916b282f5_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:3b5176fc3933d4ac14e77917dcee097a57bc5a44bf87b6c4dd2fcffa40677068_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/grafana-rhel9@sha256:6fbbfa1bc1de9fb6c7810fffdffb5be1da904efe22aa602deb4ad09b6d0c7d3a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:0838f180ac530462659838844e3fa547e50e82eb2c9a7d7f563fc5bb11ce0cc2_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:5fbbb15572fcc21cff00b8d6a4ac6cb119936e8d85eb5dfd9280c7cb270abace_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/keepalived-rhel9@sha256:fe74d4288903e8e1f590c30869d5186a83e9ba62a262a030778ab9bc305fd73a_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:2b9cc77493ee13fe6de6d5c1f0de0c0341d7ebc7f35431f0a72449a1b8f91593_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:7be06e7059c107a63d7f00f189b673c7793ecc480cfa343925afed7c52656699_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-7-rhel9@sha256:b64cd611ee6a8ba643f17a4626cb0dbfb7c4e730988ce971218c94546543beb0_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:990cbc4014d5336c9e0d0a2f1d99796215e83eda5ee8c1adb62acd67b6be067b_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e76f5b7de4ecb81e6ca945076257bbd3734da007723cc787a4ba89de41c4af04_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:f9bbb11f6d30f4a8430617f52f8d9729a2ef039596c03f1a7e674a77932b0bde_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44de5dc49f2580333eeba80002a5333566b2a77eb3390a6074087accff89e775_amd64", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:600c2838052e0e7e6c798b456cd163745b8a154d5a4570fabc86f90bc8f46f76_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:acbaae2df3e06c6f499cb5dfedb44ce3ef113462651a58015d222aecb4b3b892_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:77674d5445337c2ecb958ea79af869dc852ce9bb127673495eae4365ab8ad00d_ppc64le", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:be3e253624563fa2db911309336f7b1524d22c414bb5aee70b545cefa194ec31_s390x", "9Base-RHCEPH-7.1-Tools:rhceph/snmp-notifier-rhel9@sha256:f841aa3ee738cd4bb9333127b1b374ca817d2fa337ed2ec489ea1c056d20245e_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
rhsa-2025:4666
Vulnerability from csaf_redhat
Published
2025-05-07 16:17
Modified
2025-08-15 03:15
Summary
Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.7 container updates
Notes
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.11.7 General
Availability release images, with updates to container images and bug fixes.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE links in the References section.
Details
Red Hat Advanced Cluster Management for Kubernetes 2.11.7 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
https://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/release_notes/
Security fixes:
* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.11.7 General\nAvailability release images, with updates to container images and bug fixes.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Advanced Cluster Management for Kubernetes 2.11.7 images \n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs. See the following\nRelease Notes documentation, which will be updated shortly for this\nrelease, for additional details about this release:\n\nhttps://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/release_notes/\n\nSecurity fixes:\n\n* golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (CVE-2025-22869)\n* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)\n* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4666", "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/release_notes/", "url": "https://docs.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/release_notes/" }, { "category": "external", "summary": "ACM-15050", "url": "https://issues.redhat.com/browse/ACM-15050" }, { "category": "external", "summary": "ACM-17312", "url": "https://issues.redhat.com/browse/ACM-17312" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4666.json" } ], "title": "Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.11.7 container updates", "tracking": { "current_release_date": "2025-08-15T03:15:05+00:00", "generator": { "date": "2025-08-15T03:15:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:4666", "initial_release_date": "2025-05-07T16:17:54+00:00", "revision_history": [ { "date": "2025-05-07T16:17:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-07T16:17:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-15T03:15:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.11::el9" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "product": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "product": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "product": { "name": "rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "product_id": "rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "product": { "name": "rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "product_id": "rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.7-15" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "product": { "name": "rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "product_id": "rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.7-37" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "product": { "name": "rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "product_id": "rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "product": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "product_id": "rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "product": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "product": { "name": "rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "product_id": "rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "product": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "product_id": "rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "product": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "product": { "name": "rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "product_id": "rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.7-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "product": { "name": "rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "product_id": "rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "product_identification_helper": { "purl": "pkg:oci/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "product": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "product": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "product": { "name": "rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "product_id": "rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "product": { "name": "rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "product_id": "rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "product": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "product": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "product_id": "rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "product": { "name": "rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "product_id": "rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.7-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "product": { "name": "rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "product_id": "rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "product": { "name": "rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "product_id": "rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "product": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "product_id": "rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "product": { "name": "rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "product_id": "rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.7-17" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "product": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "product": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "product": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "product": { "name": "rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "product_id": "rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "product": { "name": "rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "product_id": "rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "product": { "name": "rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "product_id": "rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "product": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "product": { "name": "rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "product_id": "rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "product": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "product": { "name": "rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "product_id": "rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "product": { "name": "rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "product_id": "rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "product": { "name": "rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "product_id": "rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "product": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.7-7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "product": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "product": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "product": { "name": "rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "product_id": "rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "product": { "name": "rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "product_id": "rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.7-15" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "product": { "name": "rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "product_id": "rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.7-37" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "product": { "name": "rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "product_id": "rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "product": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "product_id": "rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "product": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "product": { "name": "rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "product_id": "rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "product": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "product_id": "rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "product": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "product": { "name": "rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "product_id": "rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.7-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "product": { "name": "rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "product_id": "rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "product_identification_helper": { "purl": "pkg:oci/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "product": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "product": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "product": { "name": "rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "product_id": "rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "product": { "name": "rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "product_id": "rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "product": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "product_id": "rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "product": { "name": "rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "product_id": "rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.7-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "product": { "name": "rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "product_id": "rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "product": { "name": "rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "product_id": "rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "product": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "product_id": "rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "product": { "name": "rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "product_id": "rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.7-17" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "product": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "product": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "product": { "name": "rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "product_id": "rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "product": { "name": "rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "product_id": "rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "product": { "name": "rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "product_id": "rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "product": { "name": "rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "product_id": "rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "product": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "product": { "name": "rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "product_id": "rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "product": { "name": "rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "product_id": "rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64", "product": { "name": "rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64", "product_id": "rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "product": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.7-7" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "product": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "product": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "product": { "name": "rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "product_id": "rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "product": { "name": "rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "product_id": "rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.7-15" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "product": { "name": "rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "product_id": "rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "product": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "product_id": "rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "product": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "product": { "name": "rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "product_id": "rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "product": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "product_id": "rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "product": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "product": { "name": "rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "product_id": "rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.7-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "product": { "name": "rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "product_id": "rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "product_identification_helper": { "purl": "pkg:oci/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "product": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "product": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "product": { "name": "rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "product_id": "rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "product": { "name": "rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "product_id": "rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "product": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "product": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "product_id": "rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "product": { "name": "rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "product_id": "rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.7-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "product": { "name": "rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "product_id": "rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "product": { "name": "rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "product_id": "rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "product": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "product_id": "rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "product": { "name": "rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "product_id": "rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.7-17" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "product": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "product": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "product": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "product": { "name": "rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "product_id": "rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "product": { "name": "rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "product_id": "rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "product": { "name": "rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "product_id": "rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "product": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "product": { "name": "rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "product_id": "rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "product": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "product": { "name": "rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "product_id": "rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "product": { "name": "rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "product_id": "rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "product": { "name": "rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "product_id": "rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "product": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.7-7" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "product": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "product_id": "rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-cluster-permission-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "product_id": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "product": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "product_id": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-governance-policy-framework-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "product": { "name": "rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "product_id": "rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-grafana-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "product": { "name": "rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "product_id": "rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-must-gather-rhel9\u0026tag=v2.11.7-15" } } }, { "category": "product_version", "name": "rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "product": { "name": "rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "product_id": "rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-operator-bundle\u0026tag=v2.11.7-37" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "product": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "product_id": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-config-reloader-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "product": { "name": "rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "product_id": "rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-prometheus-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "product": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "product_id": "rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-indexer-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "product": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "product_id": "rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-api-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "product": { "name": "rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "product_id": "rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-search-v2-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "product": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "product_id": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/acm-volsync-addon-controller-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "product": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "product_id": "rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cert-policy-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "product": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "product_id": "rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/cluster-backup-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "product": { "name": "rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "product_id": "rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "product_identification_helper": { "purl": "pkg:oci/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/config-policy-controller-rhel9\u0026tag=v2.11.7-11" } } }, { "category": "product_version", "name": "rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "product": { "name": "rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "product_id": "rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/console-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "product": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "product_id": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/endpoint-monitoring-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "product": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "product_id": "rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/governance-policy-propagator-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "product": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "product_id": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/grafana-dashboard-loader-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "product": { "name": "rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "product_id": "rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-client-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "product": { "name": "rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "product_id": "rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "product_identification_helper": { "purl": "pkg:oci/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/insights-metrics-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "product": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "product_id": "rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/klusterlet-addon-controller-rhel9\u0026tag=v2.11.7-12" } } }, { "category": "product_version", "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "product": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "product_id": "rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-rbac-proxy-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "product": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "product_id": "rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/kube-state-metrics-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "product": { "name": "rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "product_id": "rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-rhel9\u0026tag=v2.11.7-6" } } }, { "category": "product_version", "name": "rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "product": { "name": "rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "product_id": "rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/memcached-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "product": { "name": "rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "product_id": "rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "product_identification_helper": { "purl": "pkg:oci/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/metrics-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "product": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "product_id": "rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicloud-integrations-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "product": { "name": "rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "product_id": "rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multiclusterhub-rhel9\u0026tag=v2.11.7-17" } } }, { "category": "product_version", "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "product": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "product_id": "rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-observability-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "product": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "product_id": "rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-application-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "product": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "product_id": "rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-channel-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "product": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "product_id": "rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/multicluster-operators-subscription-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "product": { "name": "rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "product_id": "rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "product_identification_helper": { "purl": "pkg:oci/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/node-exporter-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "product": { "name": "rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "product_id": "rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9\u0026tag=v2.11.7-10" } } }, { "category": "product_version", "name": "rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "product": { "name": "rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "product_id": "rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/observatorium-rhel9-operator\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "product": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "product_id": "rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-alertmanager-rhel9\u0026tag=v2.11.7-7" } } }, { "category": "product_version", "name": "rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "product": { "name": "rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "product_id": "rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/prometheus-rhel9\u0026tag=v2.11.7-8" } } }, { "category": "product_version", "name": "rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "product": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "product_id": "rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/rbac-query-proxy-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "product": { "name": "rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "product_id": "rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/search-collector-rhel9\u0026tag=v2.11.7-13" } } }, { "category": "product_version", "name": "rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "product": { "name": "rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "product_id": "rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-addon-rhel9\u0026tag=v2.11.7-16" } } }, { "category": "product_version", "name": "rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "product": { "name": "rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "product_id": "rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-rhel9\u0026tag=v2.11.7-9" } } }, { "category": "product_version", "name": "rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "product": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "product_id": "rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/thanos-receive-controller-rhel9\u0026tag=v2.11.7-7" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le" }, "product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x" }, "product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64" }, "product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64" }, "product_reference": "rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x" }, "product_reference": "rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le" }, "product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x" }, "product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64" }, "product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64" }, "product_reference": "rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le" }, "product_reference": "rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x" }, "product_reference": "rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64" }, "product_reference": "rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64" }, "product_reference": "rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64" }, "product_reference": "rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x" }, "product_reference": "rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le" }, "product_reference": "rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64" }, "product_reference": "rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x" }, "product_reference": "rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64" }, "product_reference": "rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le" }, "product_reference": "rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x" }, "product_reference": "rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64" }, "product_reference": "rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64" }, "product_reference": "rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64" }, "product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x" }, "product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le" }, "product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64" }, "product_reference": "rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64" }, "product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x" }, "product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le" }, "product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64" }, "product_reference": "rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le" }, "product_reference": "rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64" }, "product_reference": "rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64" }, "product_reference": "rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x" }, "product_reference": "rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x" }, "product_reference": "rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x" }, "product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64" }, "product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le" }, "product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64" }, "product_reference": "rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64" }, "product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le" }, "product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64" }, "product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x" }, "product_reference": "rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64" }, "product_reference": "rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64" }, "product_reference": "rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x" }, "product_reference": "rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le" }, "product_reference": "rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x" }, "product_reference": "rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64" }, "product_reference": "rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64" }, "product_reference": "rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le" }, "product_reference": "rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le" }, "product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x" }, "product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64" }, "product_reference": "rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x" }, "product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le" }, "product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64" }, "product_reference": "rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64" }, "product_reference": "rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x" }, "product_reference": "rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64" }, "product_reference": "rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le" }, "product_reference": "rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64" }, "product_reference": "rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64" }, "product_reference": "rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x" }, "product_reference": "rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le" }, "product_reference": "rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64" }, "product_reference": "rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x" }, "product_reference": "rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le" }, "product_reference": "rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x" }, "product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64" }, "product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64" }, "product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le" }, "product_reference": "rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le" }, "product_reference": "rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64" }, "product_reference": "rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64" }, "product_reference": "rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x" }, "product_reference": "rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64" }, "product_reference": "rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x" }, "product_reference": "rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64" }, "product_reference": "rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le" }, "product_reference": "rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le" }, "product_reference": "rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x" }, "product_reference": "rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64" }, "product_reference": "rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64" }, "product_reference": "rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x" }, "product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64" }, "product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64" }, "product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le" }, "product_reference": "rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x" }, "product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64" }, "product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64" }, "product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le" }, "product_reference": "rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64" }, "product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x" }, "product_reference": "rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64" }, "product_reference": "rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x" }, "product_reference": "rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le" }, "product_reference": "rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64" }, "product_reference": "rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64" }, "product_reference": "rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x" }, "product_reference": "rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le" }, "product_reference": "rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x" }, "product_reference": "rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64" }, "product_reference": "rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64" }, "product_reference": "rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64" }, "product_reference": "rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64" }, "product_reference": "rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x" }, "product_reference": "rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le" }, "product_reference": "rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64" }, "product_reference": "rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x" }, "product_reference": "rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64" }, "product_reference": "rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le" }, "product_reference": "rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x" }, "product_reference": "rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64" }, "product_reference": "rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64" }, "product_reference": "rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le" }, "product_reference": "rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64" }, "product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le" }, "product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x" }, "product_reference": "rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64" }, "product_reference": "rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64" }, "product_reference": "rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le" }, "product_reference": "rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x" }, "product_reference": "rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64" }, "product_reference": "rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x" }, "product_reference": "rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le" }, "product_reference": "rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64" }, "product_reference": "rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x" }, "product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64" }, "product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le" }, "product_reference": "rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le" }, "product_reference": "rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64" }, "product_reference": "rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x" }, "product_reference": "rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" }, "product_reference": "rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "known_not_affected": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T16:17:54+00:00", "details": "Before applying this update, make sure all previously released erratas are\nrelevant and have been applied to your system.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "known_not_affected": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T16:17:54+00:00", "details": "Before applying this update, make sure all previously released erratas are\nrelevant and have been applied to your system.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4666" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" }, { "acknowledgments": [ { "names": [ "jub0bs" ] } ], "cve": "CVE-2025-22868", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2025-02-26T04:00:44.350024+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348366" } ], "notes": [ { "category": "description", "text": "A flaw was found in the `golang.org/x/oauth2/jws` package in the token parsing component. This vulnerability is made possible because of the use of `strings.Split(token, \".\")` to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64" ], "known_not_affected": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22868" }, { "category": "external", "summary": "RHBZ#2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868" }, { "category": "external", "summary": "https://go.dev/cl/652155", "url": "https://go.dev/cl/652155" }, { "category": "external", "summary": "https://go.dev/issue/71490", "url": "https://go.dev/issue/71490" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3488", "url": "https://pkg.go.dev/vuln/GO-2025-3488" } ], "release_date": "2025-02-26T03:07:49.012000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T16:17:54+00:00", "details": "Before applying this update, make sure all previously released erratas are\nrelevant and have been applied to your system.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to pre-validate any payloads passed to `go-jose` to check that they do not contain an excessive amount of `.` characters.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws" }, { "cve": "CVE-2025-22869", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-26T04:00:47.683125+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348367" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang.org/x/crypto/ssh package. SSH clients and servers are vulnerable to increased resource consumption, possibly leading to memory exhaustion and a DoS. This can occur during key exchange when the other party is slow to respond during key exchange.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh", "title": "Vulnerability summary" }, { "category": "other", "text": "While this flaw affects both SSH clients and servers implemented with golang.org/x/crypto/ssh, realistically the flaw will only lead to a DoS when transferring large files, greatly reducing the likelihood of exploitation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x" ], "known_not_affected": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22869" }, { "category": "external", "summary": "RHBZ#2348367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22869" }, { "category": "external", "summary": "https://go.dev/cl/652135", "url": "https://go.dev/cl/652135" }, { "category": "external", "summary": "https://go.dev/issue/71931", "url": "https://go.dev/issue/71931" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3487", "url": "https://pkg.go.dev/vuln/GO-2025-3487" } ], "release_date": "2025-02-26T03:07:48.855000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T16:17:54+00:00", "details": "Before applying this update, make sure all previously released erratas are\nrelevant and have been applied to your system.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "category": "workaround", "details": "This flaw can be mitigated when using the client only connecting to trusted servers.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh" }, { "cve": "CVE-2025-30204", "cwe": { "id": "CWE-405", "name": "Asymmetric Resource Consumption (Amplification)" }, "discovery_date": "2025-03-21T22:00:43.818367+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2354195" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang-jwt implementation of JSON Web Tokens (JWT). In affected versions, a malicious request with specially crafted Authorization header data may trigger an excessive consumption of resources on the host system. This issue can cause significant performance degradation or an application crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "known_not_affected": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30204" }, { "category": "external", "summary": "RHBZ#2354195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2354195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30204" }, { "category": "external", "summary": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3", "url": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3" }, { "category": "external", "summary": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp", "url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3553", "url": "https://pkg.go.dev/vuln/GO-2025-3553" } ], "release_date": "2025-03-21T21:42:01.382000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-07T16:17:54+00:00", "details": "Before applying this update, make sure all previously released erratas are\nrelevant and have been applied to your system.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "category": "workaround", "details": "Red Hat Product Security does not have a recommended mitigation at this time.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:cce4d7638249c914f00444ab79ff756244fd37b14850e21c1214ee759e3df122_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:d63c98f6e011d42b60370bc93daea55c07a06e9ec1c465493945b6f59498c595_s390x", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:ed73155036634720092838f314b9299371e14b1f1359e464d600188d712f2f13_amd64", "9Base-RHACM-2.11:rhacm2/acm-cluster-permission-rhel9@sha256:f2f85d21e91bd62a5f865c0ddfaa5e194fae4d357873a3150d29c553e54b619f_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:17ad9ab8dd5dc6d35f587cf57d20e4e0b15a36e18022f61a0cda5be80d345b21_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:c49ae6aab4e96ef8a6c69c74c03268dda1443a349b88031375e89b02e6ad6fe4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:d55792987afe866595075d77c9378ec863ed9e2d796e88c35521df5aeb8906f7_amd64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-addon-controller-rhel9@sha256:ddcb9a8030abaf4cc098500b2efe828d925de86b5a7afdcd5795d43ae5c2deb6_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:4d9c95f17c4f4b87745593aae6f569cdf425a162f9ae357f0ac9fd168838b5c8_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:67d5d5d847544b1d6f35945565fa13d3501c1638db6d37812d64ffb3d17a74e1_s390x", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:9d048519a5003295b1f15739cd787db345aabeecf5584ba772ce8fe76957c01e_arm64", "9Base-RHACM-2.11:rhacm2/acm-governance-policy-framework-addon-rhel9@sha256:b56e67989fe8f9a691dc9627884bd230b626ad256e8d97ddeec180e20cb01f1e_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:00a876d52992a28c1618bff36d6bb37bb1eeb8a74573d93d0f6c506e0d6ae1ee_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:8b5432459a703bed99b55371fad8ce9db4ff92143e969355a9df34dfea8dfa74_s390x", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:92ffa3497426fd7749ff6473526b925ac9d99b89389ff620c2afb25b49d0bc26_amd64", "9Base-RHACM-2.11:rhacm2/acm-grafana-rhel9@sha256:aabbb8fcb89b7b5ef7e2510e114ea16f1f8f396ee1a29ddde409bebd6c960745_arm64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:3d7245bebdd1a6626ee7ec0115f36bb3635b0faf8f33888f80ac7362535f2b8a_amd64", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:63f640d90915b10aacbb31e49c7d1980c1ea923d66ffa5388988c66ae3fe4152_s390x", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:690ceb6f7cf4485b4a879a1bb02f1ab1c6f4521260daf20b39a6ddf92587face_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-must-gather-rhel9@sha256:77e4a28dd06b587fdc911278747b26ed7e3492c263165c9ea10434cf402d4da6_arm64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:1c71881a3da648b529b3e4e254ba3557ea1347cffa945ec8f522e8a80b16f8d7_amd64", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:d35e2186f022a90ce01adf847857184834a2c09d6c82ccfe922c3d9a98aaa7ab_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-operator-bundle@sha256:e8a6352fae973fd8c17d169b70ba20b7d77427537f45eda5c02b773ad1d3ebde_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:0532d10c3796ec638cd996c1538f84cfb0793207195ee8355b6ce865dde92477_arm64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:3249de598939f928939f861aadc7e991f5cf68c901f45120dd906056595542a3_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:5468ba845d2a67e824e2a26ac799d0aa33fad0ca61661f95dadcf847cfd4f91e_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-config-reloader-rhel9@sha256:e5b568f9e6dd6438aac902282c65f9262a0753db449bc4deb812a52f9a8b78ad_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:79b69ba8e6e512dbed3210b06b75563d7510b13c16d540188375290f3bbb28b4_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:93ea476c39403bfce876b87a6b50cf91acc9bab99e999b9e5a34579ba69877ff_s390x", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:9480e4ac75fdc5ec1e2ab3c58548dbda39ba2174c5c7408b7b59937055ccf653_amd64", "9Base-RHACM-2.11:rhacm2/acm-prometheus-rhel9@sha256:a132402d7445c8bba62b12d434a27310ea6276da5aa72097f2858da80ba98cdc_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:0ab41f9cabeb828ea358fa0736aff0aa4c32b6521a7c7f3cd3a6b035f38814f6_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:1d71003dfac54727518fa4c8309de463197aac80ad90cbc1f1c80869136d00e8_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:a33eb440ae2c6ef2a07818377508a88530c129396911c096b2fff9371b53b4ec_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-indexer-rhel9@sha256:b5b5824dfbacc33b3e9699ccf321870fa17f41f83c27576408f17c5ce5464766_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:59a6eae21f3246ebc57adfe89e7a0e237220c26d2a01e958abc991172abe6897_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d23a2404ba9b28f26417b2a2af60081514d918daf669daf1aec63a3294d76e06_s390x", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:d4c91fecc331d8af924084572589c1f0d36efd657c84fbeb0b9fd0b263912f4f_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-api-rhel9@sha256:fcabed7be93e0c4b8daeaa68176a76e171ae6d18002e38ba5ee75fc95c1e0ac1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:0c92316f61cbd66c1e4e6b91219a3c840fe217e0ee5d7bea051a5a8f4dc744e7_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:894dd46d068010a41ef9e2004f2bb6459395d1bcb47687e542de4d1ea8a7c0c1_arm64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:95aae9c017a9809cae869a76d59f6d72f8754061ebb8d797c68f9474fc3b4d5b_amd64", "9Base-RHACM-2.11:rhacm2/acm-search-v2-rhel9@sha256:a236f4ee72c8f5eebdb5cb9592cf65c9c67848658f398459e4a2b782435b5d76_s390x", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:555d679d0a4e3e3100aebdaf78d9686a30b9a10d7b266f5f633155c7130781e0_arm64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:8f0d3fc75d0bae3ea2c0776649bce6cbcb7d721e6078be9607d72e41d529caed_amd64", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:c63becb51a6c6fa01154d801e1e5f3b4f27e9ead25894a4ca7c147abf42544a5_ppc64le", "9Base-RHACM-2.11:rhacm2/acm-volsync-addon-controller-rhel9@sha256:e485c3e52083e9cfe9085c8e9195014c2af9f918e9fe0e1ebdee33fa71b56fcf_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:3ff8a2ad47569c2222cbb03875948514300038584dd8654beaf80f079795d145_s390x", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:55b12a7c6fc8b8c3bf5f01524d072c686e91112cfd50e94d908dbfcb6a1cadef_arm64", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:68c83e6503a11d5e056867fcf06146953c46a90c9cdf7af56af4c7676d780919_ppc64le", "9Base-RHACM-2.11:rhacm2/cert-policy-controller-rhel9@sha256:9a2b7025d23d52c691f964353aef2f57f1745a5f83329d6938e0ab4576807162_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:0826c572f6a2e6cc0c6d635b49c3b157ed0727fbfcae11e81bc23e2b53ffb525_arm64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:be8ba2f15746472ff77e5d3b25abfcc1abb0217291a5fa070723dc93014e791b_ppc64le", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:cc48fda82d8f6243a2a47e82c63c1ae3c315dcc86d156a13feca55c18e2d5a34_amd64", "9Base-RHACM-2.11:rhacm2/cluster-backup-rhel9-operator@sha256:f3b4ab44aeac4df05ebf1b0b82cc548462787a48717297194a6ac7d2cfcbb852_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:5cad33ccd2811da01d17b5657b35919ed554a3e7cb1daafdace8e85d05b02be4_arm64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:d6ec9891c49de48f10bf34241690b7c89ff558b14ff43c4dc76feda230759228_amd64", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:dcd47b99ec366b67aab2f4795b235b75c29be3918b69707afada31cb6bf2ae82_s390x", "9Base-RHACM-2.11:rhacm2/config-policy-controller-rhel9@sha256:ec13ef04d1682bf59c2541d0036cfd8886275e133516cddbcb19ddf4382b3103_ppc64le", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:792bcf19fe1de75ad6ec22980aa2ba457456439fdf634330246f63167b9ea307_s390x", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:c4159ff05b6974bba182bb7f5a8fa9cd18c85b24be4ad7ea37d7718607823c6c_arm64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:d17932e043db69005823ac1d074995e845657fe058dd393e7c090185cf1c3ffd_amd64", "9Base-RHACM-2.11:rhacm2/console-rhel9@sha256:f7bbe6a72dd592f6ce50aa0025906dd9799cdab73f0f68501250fdefbf152e9e_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:050dafd97e5b84639bc6711447b303d0f4a62d8a5b681c3857a820f9ba9162c4_ppc64le", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61bb15b9b1cc624bbd0ded0c2d7708b7f83bdc0fbe18ebf0ae014672971d81fe_s390x", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:61cc4d21f1e24a1303eb9341ac021f6ab30985374820d35c293957888f2b2969_amd64", "9Base-RHACM-2.11:rhacm2/endpoint-monitoring-rhel9-operator@sha256:c9141fa19aef2e6d29755c90061af7f026934b96c4a4938630adb2edf20bb8e3_arm64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:12ba153b19709c0867d0f1bbc6899c9f96db5ff9abecd9c791ac24100591c65f_s390x", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:96b4194295f4fe694014677694a2572852355e85e2b94e5a59d4c9cd0b1ce21f_ppc64le", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:bcefc8fd2927ab982b8736909afb9a1a089177c968a1740dfa0f60897a68eaac_amd64", "9Base-RHACM-2.11:rhacm2/governance-policy-propagator-rhel9@sha256:c20f16ac40cca4d596262cbc6bbdbafcb903b0271c1eeec3dc54b983600a6c79_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:2c9c0bebc86bfa1b00244904c9d76a26f2ca2259f14bc6c4eab5142c8f367e6d_arm64", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:5e279eea4b26c8ab4a45630cb817336cd79d18c8199b35248e698e9a46fdee91_ppc64le", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:a8eaee40ad5dded88a9305c03c561c6abd34f0a37cb15e158b847819e34c8eef_s390x", "9Base-RHACM-2.11:rhacm2/grafana-dashboard-loader-rhel9@sha256:d56d79a5d63b6fbe3ead7189f1c29cfdb030a97f63387d852d3fc6b0f9fa9a34_amd64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:009d5a555b395a1bbe5864819bbfc2926e001b38a4b03b79d131c580aaabadc6_s390x", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:393905442da85080af4a94ad0cd8eeabc41d839249bc950aa70ef98cfb035886_arm64", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:8649e61d5a6f0050aed0d2ec485c5c36c6e067801354f5c1667f6f690c3c2dae_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-client-rhel9@sha256:ab1d7a86d54a2169514e53a34161eeea6abb580a9e3dad73b2e631d4c41c7b7b_amd64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:652d4e64c15311e7224bfc61c281acab6437c13f76cdaf3aeb1653677eeff48d_arm64", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:80038b3e6c1a214f320bcb6c66b549377f3f11bcb1a8a01c69e2e23a8218f09a_s390x", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:82917aa911c3877a779f63126f413cce9e7c910ad4257b9e6030753d7a06d674_ppc64le", "9Base-RHACM-2.11:rhacm2/insights-metrics-rhel9@sha256:f5d8c29282fd86f51cc086c0adae90858c91f13aa4c7c568d0db3e7dc0974ddc_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:4b88edacf430cd170c8c88c138abf0effa26c09a3471c3b7953e2ca62d018a4b_ppc64le", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:73efa41c6c24dbd5c5afcdd30eca904058eb548ddea073c463dfbe5e212326e7_amd64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:b2a3c348b3d1392589e0773fb374e47a064f2954383a24103a8bdb887d2cb9a2_arm64", "9Base-RHACM-2.11:rhacm2/klusterlet-addon-controller-rhel9@sha256:d08e4aaa320ed7ce31c20bbb2cd8e984fbe7a0cfbb3325504d8189267f149f79_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:1d226fb3dcb578d05819e0653f6c62105504b97e0c51303242fd4a6525946ea8_arm64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:9aa654179ddff9e7490653bcadfbfbd40a6e1a6088d76f2b3ddee755689d3a12_amd64", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:cc11263bc748bd79febd1b837e07769d5c5f86b408be373b5738da2b24990076_s390x", "9Base-RHACM-2.11:rhacm2/kube-rbac-proxy-rhel9@sha256:dc660045b803c2da5abd436c16154505219c7f0cb6ca8a952a03d79a0edfa0c2_ppc64le", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:6c06705233b5f7c131f828e3da22999b9cff2316085a03fda1ce2c48ac81d21d_s390x", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:8aebfa0485a1fff708bf0dbe4807395cd1528d87cb52166cd690be20ae2de6db_amd64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:b82e1db286c14a1345e917dd01b2c53837ac55c50d114c3d430cbfbf772dded5_arm64", "9Base-RHACM-2.11:rhacm2/kube-state-metrics-rhel9@sha256:d6b7ce87df6d10b23659335b3ac7412937723900342f6b4e54afa9b758df708a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:3ef3168a9011ce366b32af10ccd78880524a7359844449ea8c126aad6aad9c1a_ppc64le", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:495b34dfd1eb38f9b1e28afb90e706cd9b1f3a5cfc4ab42b897de8d338a0cc3f_amd64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:6a5f94e1cfad90217d015a0ba4c8160a1f19d782b29fbe6433facab7d079dc2d_arm64", "9Base-RHACM-2.11:rhacm2/memcached-exporter-rhel9@sha256:dfbda52b25cd4d935df09fd7b28a1577825818238aff7d0d237d3598f3f1764e_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:145c250f2f828a20821b98ff2cb63e6c509002c55fd20528125a19051ef57a00_arm64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:a5ea2d9b309d350423d8f2801296e818c7f0e36db7a44e4041dc2c1958e79514_s390x", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:d154d8a22d28b0b4045a5b3d7a3238cc7a11403c368f0031b50b3f40bd50192d_amd64", "9Base-RHACM-2.11:rhacm2/memcached-rhel9@sha256:ec7b96d0251dd78d8b9269ff2b73ccc70efaa787b46768686db87e1411a6dc28_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:598c14b445b64ec3339910c0002869c50fa495fb590b384f547f7ebecb484278_ppc64le", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:93e849b94ed635b1792962a821063a3a3b8fb300de244a45988236ef5f799f3f_s390x", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:de6d71c7a398e20f294af206e6c3f706245b79dff0ba279745772d233f99821f_amd64", "9Base-RHACM-2.11:rhacm2/metrics-collector-rhel9@sha256:fe430c3eb3d8eee61953592e6fe5c0f6d775a0fe739cf8ec3a207f1a2e68bfd2_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:272f8ae42c57c665ae33b01be633d1735d77665e6c539dec8c9abebe072144ef_s390x", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:68da3c990f88a7769418680b45ede4af9af68cd0d859c0ee71497b2623938d53_arm64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:6cd29158d2cb2c27f6c8412aac705baac5d2639d564aaaddc4a4070b11ad5307_amd64", "9Base-RHACM-2.11:rhacm2/multicloud-integrations-rhel9@sha256:de669322674d7320df89c647ab9bef91e02f7efca620d09186c086c54bd41564_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:1da1c9422995c5624e739e4804e15a4bd9847731513ed166bf6d7ccabe4c557d_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:783f0dcada7723c48615a008ca9cd6b9f14ec5157b3710862420e97f7cc4894c_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:818a86fe68d1ab572ba74e225b3939a0774bf8ba2aba0cbc604da5a9cab66dae_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-observability-rhel9-operator@sha256:9a6be8b958f4828c7be92f90d2e7f2a64d2ee06d9f7a53d2b367389d13a05bbc_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:6403f9cfccdeb69e8230ea9b732246096fbaa954cb6726a0ec7241327634f352_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:97fbee2a4068548c95abc50cc02b5964802c0d45b128f1639f0ca974a654da3f_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:be3ff7b3a0eecd4f506cb2c42cd85c0d77c16c43683c347cacc6da4124a74aa4_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-application-rhel9@sha256:f669daab61a2ceb6416fa30fe7d862aa9152468e47bd865bb980f5498d0ce8d7_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:6bf53d300a6cff8293b58567676e22778c2b4ab10ffb87147ec65fe4f8b0c46b_s390x", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:95d44e22d7ff0901f6bad80ad080df294feb2e246218430620dc9aca8c27d048_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:b0446d611fcaf8a55e1369e7a7ccb9ad350d975a1332069ddbe59eb9d530a22d_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-channel-rhel9@sha256:f46f69bf3bd2e90a52261476df2df5b73f50b4f43de4fd25c5e8eeaca413c1db_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:193a493aa6210983b93fe99594386cbbdd33cc2b184831cde9a6db57c77b3e93_ppc64le", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:ab2c0712786abfc615b6051b85c49d98e28038c9d3291a295cf2abad52194864_amd64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:e5c64c8bcb7f4ba0d1fb8cd437ed288a58687442b164e0cb1d2f069acb69139b_arm64", "9Base-RHACM-2.11:rhacm2/multicluster-operators-subscription-rhel9@sha256:fba804be1d2c6a2141f50e0691ca3c53a49745a469717b10a16025515f3a53cb_s390x", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:0d55fa3f5457f156b73080f33c90c95b5a7a86eca8db2f17dba04e9461c04c66_ppc64le", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:279b7b46decefe87a5da5d8c3158a4835dea9f7be5a22f610d1ccb640d5a4120_arm64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:3fc105c44a5f384f7afd0725ea60fea7e3dcb1d0e6377c286f4d4294b8065246_amd64", "9Base-RHACM-2.11:rhacm2/multiclusterhub-rhel9@sha256:b0adf664cbb7ece81be4f2674558d4ad8ff5805dd73f4b0ebebb4c90f653239c_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1103e3a2c0dc9cc39a7a4d7c759d7a684ae783b97c7e1fc790fb703feacc2255_ppc64le", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:1d130589e3926d48253981cc234ed9492fe9ca6f5e87a5d81ea7a9f00d0d3fe9_s390x", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:e649ccd3568f9e589fcdfbd1b86934f63e840fdcc6a0aa0bc75c32f830b5ad24_amd64", "9Base-RHACM-2.11:rhacm2/node-exporter-rhel9@sha256:ffde842f232450af8538e63dc74d9a303b57ba98aa4da40627ede05fd2135cc1_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:254c2512d89e9b2f672cb152f71bec0d3059b7bd2c2cd430f20a344699237acc_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:5802e874b2f716f3a6c061c1001b717902e1c66c455cb355217c4f357f1ffb63_arm64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cdc09f88c4f1d35269371ac8bc6be21be704872b2045b8627a7bb63d2f3f0b33_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9-operator@sha256:cedd0496946dbf8af6bbb25ae1fb47bc3c88049f681c3ca58796cbd716ab0956_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:14a094e72692779d9aa83844fa5ae63ac68810c4fae46c4e1fe5065030862e3c_ppc64le", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:2811fda7247a23c3ed2278dc034147feac0d869fadbf7375782513358fac3892_amd64", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:725629078b4bd0f91171a05c54019362842ad128194bf8889c7e63f1699e8377_s390x", "9Base-RHACM-2.11:rhacm2/observatorium-rhel9@sha256:d93d13340bf59d8126fdbd4206ea40c84625ab3cfdb96a72a33dd7691ec7b302_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:4eca77ab3631c307ce6938789791843a6f242049a1ef513bf422cabd42c6ebac_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:79222f81e33045539fc48260cd35ffa277b584602e13cdcd5a5f8b08063f23d8_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:ba1fb822e67cf051e7e7636bca6ca20aafd7f08a175b5ea0bc2e9ac5a42fb0df_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-alertmanager-rhel9@sha256:e2f13f384355bf1428c7e288c9e19b81656ae03bafba0a78ae3b09a7293afa79_ppc64le", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:029aa3ffdc739ae2e871721e70631e76793f009f9b45a8dec3f5d3a1c3742ef0_s390x", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:4260a4584981dfd486ae6a2a1c6c7d6a5492e12f5e63660833ba02d46bd03835_amd64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:911a4e7227929edf39edfd91fc56d8d5a435c4b69f64f4fc1a4e3eb02df9841f_arm64", "9Base-RHACM-2.11:rhacm2/prometheus-rhel9@sha256:a313cdc545b232736c226d48a5aa8aeb7e4571dc9961dc697538ebdec8c43dd9_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:0f4d878bb25c812ba79b6e916136c22943138a0ea84c98fa76bc3fbab8baebe3_arm64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:409929bab7eb2650886e538d1fed112bfc82a1086400655302c1a5c0c49d92d1_amd64", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:6af5827560f7b70ff509936e04f0ae0a0002f4308d57333c21c417a090befd82_ppc64le", "9Base-RHACM-2.11:rhacm2/rbac-query-proxy-rhel9@sha256:7c3bfb3c65ad6daedd4bc83c81a01a273832782a10541d691b376746721c9292_s390x", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:472aee3cec73074bdfc92e956d1722c26867da3cc509d2819fadc679d849a4f2_amd64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:70936b7fcdfbe33039ac18498e851b336222dc39eaff476816f3cbf211ec40e3_arm64", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:db3a256d6539bf9da860049567122372fb7cbc2b9bc8d7190556d42636cd4a1b_ppc64le", "9Base-RHACM-2.11:rhacm2/search-collector-rhel9@sha256:f27ee7d7e9b40f2519d34cf0401b828f143703394837b85b6eca6e8f223bb172_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:59c3198721c01d7f8a16a381e1857439e8e6365859cd7880c6db9b1dee2508c8_arm64", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:5b750409d445a8a357db1484d15ba913c2323c0fcf1083e07452c2195715d9fe_s390x", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:b12239e267c5d0965f0736fb4aeb3df38804cf680b192684f3593381eff60855_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-addon-rhel9@sha256:f3e853024542817595ed86d6673b83a99d972cc52a2d6539ef7b4fe269b125ae_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6766ce8054bf45764bc5c36c9200455e61bc719a5ef04c1d09b4963e21bf93f2_amd64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:6cf29875d145afc29835440fe71db342db9c0b0e4ec83ba4307e8b5f15234d85_s390x", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:92d53a4af657c7046494c0676c3aba00d392bbfd626d86ff03f41c041574c4cf_arm64", "9Base-RHACM-2.11:rhacm2/thanos-receive-controller-rhel9@sha256:eddb044dc6f71540171abe82172ee5d0cf87965aa253eb4d97ca92b074089ea6_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:07cbcffc426cc8c28e41fe4db097f3d56589b00436627133ad74e0d5d4793da7_ppc64le", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:1c2b756b7fbaa5b71af598476c351fe7315734522622345e95cc4e24a2cfed5d_arm64", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:76f59999d679f487d78e56469ab267455c225dcb44f0bf9eb11ca0098784ac91_s390x", "9Base-RHACM-2.11:rhacm2/thanos-rhel9@sha256:9a8b71d150f7470cca2422b6d730294b1d87c24b20ab97e8f419cf0f9e19215a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing" } ] }
rhsa-2025:4810
Vulnerability from csaf_redhat
Published
2025-05-12 15:04
Modified
2025-08-18 09:21
Summary
Red Hat Security Advisory: RHSA: Submariner 0.18.5 - bug and security update
Notes
Topic
Submariner 0.18 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.11.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.
Details
Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.
For more information about Submariner, see the Submariner open source community website at: https://submariner.io/.
This advisory contains bug fixes and enhancements to the Submariner container images.
Security fix(es):
* quic-go: quic-go affected by an ICMP Packet Too Large Injection Attack on Linux (CVE-2024-53259)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* crypto/internal/nistec: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (CVE-2025-22868)
* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Submariner 0.18 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nSecurity fix(es):\n\n* quic-go: quic-go affected by an ICMP Packet Too Large Injection Attack on Linux (CVE-2024-53259)\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n* crypto/internal/nistec: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)\n* golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2 (CVE-2025-22868)\n* golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing (CVE-2025-30204)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:4810", "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2329991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329991" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "2354195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2354195" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4810.json" } ], "title": "Red Hat Security Advisory: RHSA: Submariner 0.18.5 - bug and security update", "tracking": { "current_release_date": "2025-08-18T09:21:06+00:00", "generator": { "date": "2025-08-18T09:21:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:4810", "initial_release_date": "2025-05-12T15:04:37+00:00", "revision_history": [ { "date": "2025-05-12T15:04:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-12T15:04:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-18T09:21:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.11::el9" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "product": { "name": "rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "product_id": "rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "product": { "name": "rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "product_id": "rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "product_id": "rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.18.5-4" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "product_id": "rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.18.5-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "product": { "name": "rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "product_id": "rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "product": { "name": "rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "product_id": "rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "product_id": "rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.18.5-4" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "product_id": "rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.18.5-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "product": { "name": "rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "product_id": "rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "product": { "name": "rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "product_id": "rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "product_id": "rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.18.5-4" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "product_id": "rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.18.5-3" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "product": { "name": "rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "product_id": "rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "product": { "name": "rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "product_id": "rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "product_id": "rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.18.5-4" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "product_id": "rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.18.5-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.18.5-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64" }, "product_reference": "rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le" }, "product_reference": "rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64" }, "product_reference": "rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x" }, "product_reference": "rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x" }, "product_reference": "rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64" }, "product_reference": "rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le" }, "product_reference": "rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64" }, "product_reference": "rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "relates_to_product_reference": "9Base-RHACM-2.11" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.11 for RHEL 9", "product_id": "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64", "relates_to_product_reference": "9Base-RHACM-2.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-12T15:04:37+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4810" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-53259", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2024-12-02T17:01:10.568793+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2329991" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Quic-Go where an attacker can inject malicious data into network packets, potentially allowing them to cause harm. The issue arises from a configuration option used by some affected versions of the code that sends out information about packet size limitations. As a result, when Quic-Go attempts to send a packet larger than it claims to be able to handle, the operating system will reject it due to a \"message too large\" error.", "title": "Vulnerability description" }, { "category": "summary", "text": "quic-go: quic-go affected by an ICMP Packet Too Large Injection Attack on Linux", "title": "Vulnerability summary" }, { "category": "other", "text": "In regulated environments, certain controls are used together that help prevent CWE-345: Insufficient Verification of Data Authenticity. As a result, this vulnerability has been downgraded from Moderate to Low severity.\n\nRed Hat restricts access to all information contained within the platform by default. Access to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, ensuring that mechanisms such as digital signatures or certificates verify the authenticity and origin of data. External infrastructure and internal cluster certificates are established and maintained within the secure environment. The platform enforces validated cryptographic modules across all compute resources, helping prevent unauthorized actors from accessing or interpreting exposed information, even if it is intercepted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-53259" }, { "category": "external", "summary": "RHBZ#2329991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2329991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-53259", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53259" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-53259", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53259" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/commit/ca31dd355cbe5fc6c5807992d9d1149c66c96a50", "url": "https://github.com/quic-go/quic-go/commit/ca31dd355cbe5fc6c5807992d9d1149c66c96a50" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/pull/4729", "url": "https://github.com/quic-go/quic-go/pull/4729" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/releases/tag/v0.48.2", "url": "https://github.com/quic-go/quic-go/releases/tag/v0.48.2" }, { "category": "external", "summary": "https://github.com/quic-go/quic-go/security/advisories/GHSA-px8v-pp82-rcvr", "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-px8v-pp82-rcvr" } ], "release_date": "2024-12-02T16:12:40.605000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-12T15:04:37+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "category": "workaround", "details": "Use iptables to drop ICMP unreachable packets.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "quic-go: quic-go affected by an ICMP Packet Too Large Injection Attack on Linux" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-12T15:04:37+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4810" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" }, { "acknowledgments": [ { "names": [ "jub0bs" ] } ], "cve": "CVE-2025-22868", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2025-02-26T04:00:44.350024+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2348366" } ], "notes": [ { "category": "description", "text": "A flaw was found in the `golang.org/x/oauth2/jws` package in the token parsing component. This vulnerability is made possible because of the use of `strings.Split(token, \".\")` to split JWT tokens, which can lead to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this functionality by sending numerous malformed tokens and can trigger memory exhaustion and a Denial of Service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22868" }, { "category": "external", "summary": "RHBZ#2348366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22868", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22868" }, { "category": "external", "summary": "https://go.dev/cl/652155", "url": "https://go.dev/cl/652155" }, { "category": "external", "summary": "https://go.dev/issue/71490", "url": "https://go.dev/issue/71490" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3488", "url": "https://pkg.go.dev/vuln/GO-2025-3488" } ], "release_date": "2025-02-26T03:07:49.012000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-12T15:04:37+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "category": "workaround", "details": "To mitigate this vulnerability, it is recommended to pre-validate any payloads passed to `go-jose` to check that they do not contain an excessive amount of `.` characters.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang.org/x/oauth2/jws: Unexpected memory consumption during token parsing in golang.org/x/oauth2/jws" }, { "cve": "CVE-2025-30204", "cwe": { "id": "CWE-405", "name": "Asymmetric Resource Consumption (Amplification)" }, "discovery_date": "2025-03-21T22:00:43.818367+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2354195" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang-jwt implementation of JSON Web Tokens (JWT). In affected versions, a malicious request with specially crafted Authorization header data may trigger an excessive consumption of resources on the host system. This issue can cause significant performance degradation or an application crash, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30204" }, { "category": "external", "summary": "RHBZ#2354195", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2354195" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30204" }, { "category": "external", "summary": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3", "url": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3" }, { "category": "external", "summary": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp", "url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3553", "url": "https://pkg.go.dev/vuln/GO-2025-3553" } ], "release_date": "2025-03-21T21:42:01.382000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-12T15:04:37+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.11/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "category": "workaround", "details": "Red Hat Product Security does not have a recommended mitigation at this time.", "product_ids": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:389bf258c46a2fc3bd38d2d27eaca11ffd8148d477ab851af59643b4d1f32d80_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:81a4e35a991045c573f3ee5e684390617c289f9f4e0fbbf78a7e55441ebcfffa_ppc64le", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:83336a9d35b707e9a91868916882e008156f3633f23349fd52e1f26e381224ec_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-agent-rhel9@sha256:cb5f236b34ebb961bbb459aade268cb75659092cdfb3e112990c8c19f6456f20_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:2ed5bbd3796d6eba8f287d12b7c5f71a4d5e720b68bf0f2f24e3076c66452070_s390x", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:76961e9f6469568b405698446d3637e7e292797b27246803061024b4750d5fa7_arm64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:7e79eb64d94b0acd167292f2a2c9a2a031661962b72d03dae9352a0eea40565f_amd64", "9Base-RHACM-2.11:rhacm2/lighthouse-coredns-rhel9@sha256:aca3e04ec4d68baadb49ee2a7f08855f6ef723b020555e8fb098ceedf81e97df_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:130ffbe938cc136c9f112b2fdb0c6dd6f3712e46e39a7f9c6ce06d45f89ceee4_amd64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:2f9da5aaeafa4c6f21b81e34afd141694f09346567c0424d9ee6d9f7f3be5e1f_ppc64le", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:3fbf280a51d788d1e861aa72231bc63142aab2db08e2d358b68f10af1926d76d_arm64", "9Base-RHACM-2.11:rhacm2/nettest-rhel9@sha256:febf756fb1e4b5d794dfc65be682a84bfae872cbcf897f46b3dd45061d1fd4f1_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:02ca4183da204f63a74c592e51c5515afddd3a995b7016689ab84e3cca35eee7_s390x", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:085ae9ff5dfa4e3f1d961d019d28c6e7a99abff4e3c185852c6547cd17f81136_arm64", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:276b6bfc9a9fd9fbe04bf6f57c8f07eb66f43ab587acdd351d519b503b6e4aa1_ppc64le", "9Base-RHACM-2.11:rhacm2/subctl-rhel9@sha256:3b2bd11ed4fa07acd850b31e58e44576fc18a15f051d0ab87bfeca27429d00fb_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:1736510c77d31f44c41a6296247c23ed6233edd24d34e0bce154294491f4be3d_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:a049449a67ee5c9d4fee19b7dafc087f3647438a8ebfc94afd13409817f7ae11_s390x", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:cd0ef43fabb276b20e4984c0b0872a71e2895ce0c10c5cc02648237297429884_amd64", "9Base-RHACM-2.11:rhacm2/submariner-gateway-rhel9@sha256:d1c68df738f63ecdedcfa31105bd542b70652bbc5e380d371fbfd2f2b07147f5_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:288dde5c26721a63b3d7db538f9f13e0672fdc01d7d2d0d28ba8495ddc855f26_arm64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:68d4c8d48073e15519ea25ea149f13cbfeb4513ca2cfc115108195d30847ee54_amd64", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8ae3f309e90f4e96fa43cb402604c3a592befe53278194645b3161425d385b95_s390x", "9Base-RHACM-2.11:rhacm2/submariner-globalnet-rhel9@sha256:8d74068d66452a5670ee261bd750965a2e866a85fb6910cad3da73caa4fa3db7_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:4026f2e4eb01326b964fc9af1d29fa0d1492847c3434d6c0b78c354e1046768c_arm64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:7a23eb13e0197b73cf2bb105a8ea038ae9c21904789c489ac56f54dea6b3ed95_amd64", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:b7ea8fedc18e390e971994a9759542d543c09699eb382d5fe982cb1e8ee5b285_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-operator-bundle@sha256:d0f3266a59134031aab23284ea1154d6dcac84f49b7f8645d73c9b889126debb_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:1166829081e0697db0ff7b348e9b96cbe63a9382d7534e6ab093527e91b87fe2_amd64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:43e7870f68c3fd5f7e14188cc0395a27863a4c8bdc01ac9d92c3c3dc54974aeb_arm64", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:846d8be26dd856197b1772a3f6c1cf6ee205c9c2e79ba3ccda1f473cdc9853ca_s390x", "9Base-RHACM-2.11:rhacm2/submariner-rhel9-operator@sha256:9d3dfd05f7eea812e4e6cfb0fb69c3c6b869dd372af4eaa24c7c794c8a896a04_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:733030d58413e7341c89e0d501c0fc7b2be8d5063c635560a5af62afe1120b15_s390x", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:89d65541a21a7d44bef87539762ea6c28d8768c6bc0292bb5956d801d57943fa_ppc64le", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:bae84a09c4cf3b5160d737f05c4dc552827ed0f4b1cbdce56719a10cf57395da_arm64", "9Base-RHACM-2.11:rhacm2/submariner-route-agent-rhel9@sha256:f5b723ae4deed730a1def563565cc0bb0a04e8fa59d2417aa974f8ef473f1380_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang-jwt/jwt: jwt-go allows excessive memory allocation during header parsing" } ] }
rhsa-2025:9514
Vulnerability from csaf_redhat
Published
2025-06-24 11:31
Modified
2025-08-14 03:17
Summary
Red Hat Security Advisory: rhc security update
Notes
Topic
An update for rhc is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.
Security Fix(es):
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rhc is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription management.\n\nSecurity Fix(es):\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:9514", "url": "https://access.redhat.com/errata/RHSA-2025:9514" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_9514.json" } ], "title": "Red Hat Security Advisory: rhc security update", "tracking": { "current_release_date": "2025-08-14T03:17:35+00:00", "generator": { "date": "2025-08-14T03:17:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:9514", "initial_release_date": "2025-06-24T11:31:03+00:00", "revision_history": [ { "date": "2025-06-24T11:31:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-06-24T11:31:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:17:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.3.2-1.el10_0.src", "product": { "name": "rhc-1:0.3.2-1.el10_0.src", "product_id": "rhc-1:0.3.2-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.3.2-1.el10_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.3.2-1.el10_0.aarch64", "product": { "name": "rhc-1:0.3.2-1.el10_0.aarch64", "product_id": "rhc-1:0.3.2-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.3.2-1.el10_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "product": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "product_id": "rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.3.2-1.el10_0?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "product": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "product_id": "rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.3.2-1.el10_0?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.3.2-1.el10_0.ppc64le", "product": { "name": "rhc-1:0.3.2-1.el10_0.ppc64le", "product_id": "rhc-1:0.3.2-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.3.2-1.el10_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "product": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "product_id": "rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.3.2-1.el10_0?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "product": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "product_id": "rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.3.2-1.el10_0?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.3.2-1.el10_0.x86_64", "product": { "name": "rhc-1:0.3.2-1.el10_0.x86_64", "product_id": "rhc-1:0.3.2-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.3.2-1.el10_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.3.2-1.el10_0.x86_64", "product": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.x86_64", "product_id": "rhc-debugsource-1:0.3.2-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.3.2-1.el10_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "product": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "product_id": "rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.3.2-1.el10_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rhc-1:0.3.2-1.el10_0.s390x", "product": { "name": "rhc-1:0.3.2-1.el10_0.s390x", "product_id": "rhc-1:0.3.2-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@0.3.2-1.el10_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debugsource-1:0.3.2-1.el10_0.s390x", "product": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.s390x", "product_id": "rhc-debugsource-1:0.3.2-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debugsource@0.3.2-1.el10_0?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "product": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "product_id": "rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc-debuginfo@0.3.2-1.el10_0?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.3.2-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.aarch64" }, "product_reference": "rhc-1:0.3.2-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.3.2-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.ppc64le" }, "product_reference": "rhc-1:0.3.2-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.3.2-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.s390x" }, "product_reference": "rhc-1:0.3.2-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.3.2-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.src" }, "product_reference": "rhc-1:0.3.2-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-1:0.3.2-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.x86_64" }, "product_reference": "rhc-1:0.3.2-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.aarch64" }, "product_reference": "rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le" }, "product_reference": "rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.s390x" }, "product_reference": "rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debuginfo-1:0.3.2-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.x86_64" }, "product_reference": "rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.aarch64" }, "product_reference": "rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.ppc64le" }, "product_reference": "rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.s390x" }, "product_reference": "rhc-debugsource-1:0.3.2-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-debugsource-1:0.3.2-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.x86_64" }, "product_reference": "rhc-debugsource-1:0.3.2-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.src", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-06-24T11:31:03+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.src", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:9514" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.src", "AppStream-10.0.Z:rhc-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debuginfo-1:0.3.2-1.el10_0.x86_64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.aarch64", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.ppc64le", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.s390x", "AppStream-10.0.Z:rhc-debugsource-1:0.3.2-1.el10_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" } ] }
rhsa-2025:2789
Vulnerability from csaf_redhat
Published
2025-03-13 14:28
Modified
2025-08-14 03:15
Summary
Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.0 release
Notes
Topic
Red Hat build of OpenTelemetry 3.5.0 has been released
Details
Release of Red Hat OpenShift distributed tracing provides following security improvements, bug fixes, and new features.
Breaking changes:
* Nothing
Deprecations:
* In the Red Hat build of OpenTelemetry 3.5, the Loki Exporter, which is a temporary Technology Preview feature, is deprecated. The Loki Exporter is planned to be removed in the Red Hat build of OpenTelemetry 3.6. If you currently use the Loki Exporter for the OpenShift Logging 6.1 or later, replace the Loki Exporter with the OTLP HTTP Exporter.
Technology Preview features:
* AWS CloudWatch Exporter
* AWS EMF Exporter
* AWS X-Ray Exporter
Enhancements:
* The following Technology Preview features reach General Availability:
* Host Metrics Receiver
* Kubelet Stats Receiver
* With this update, the OpenTelemetry Collector uses the OTLP HTTP Exporter to push logs to the OpenShift Logging (LokiStack) 6.1 or later.
* With this update, the Operator automatically creates RBAC rules for the Kubernetes Events Receiver (k8sevents), Kubernetes Cluster Receiver (k8scluster), and Kubernetes Objects Receiver (k8sobjects) if the Operator has sufficient permissions.
For more information, see "Creating the required RBAC resources automatically": https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry/configuring-the-collector#otel-creating-required-RBAC-resources-automatically_otel-configuration-of-otel-collector
Bug fixes:
* Before this update, manually created routes for the Collector services were unintentionally removed when the Operator pod was restarted. With this update, restarting the Operator pod does not result in the removal of the manually created routes.
Known issues:
* Nothing
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat build of OpenTelemetry 3.5.0 has been released", "title": "Topic" }, { "category": "general", "text": "Release of Red Hat OpenShift distributed tracing provides following security improvements, bug fixes, and new features.\nBreaking changes:\n* Nothing\n\nDeprecations:\n* In the Red Hat build of OpenTelemetry 3.5, the Loki Exporter, which is a temporary Technology Preview feature, is deprecated. The Loki Exporter is planned to be removed in the Red Hat build of OpenTelemetry 3.6. If you currently use the Loki Exporter for the OpenShift Logging 6.1 or later, replace the Loki Exporter with the OTLP HTTP Exporter.\n\nTechnology Preview features:\n* AWS CloudWatch Exporter\n* AWS EMF Exporter\n* AWS X-Ray Exporter\n\nEnhancements:\n* The following Technology Preview features reach General Availability:\n\n * Host Metrics Receiver\n\n * Kubelet Stats Receiver\n\n* With this update, the OpenTelemetry Collector uses the OTLP HTTP Exporter to push logs to the OpenShift Logging (LokiStack) 6.1 or later.\n* With this update, the Operator automatically creates RBAC rules for the Kubernetes Events Receiver (k8sevents), Kubernetes Cluster Receiver (k8scluster), and Kubernetes Objects Receiver (k8sobjects) if the Operator has sufficient permissions.\n For more information, see \"Creating the required RBAC resources automatically\": https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry/configuring-the-collector#otel-creating-required-RBAC-resources-automatically_otel-configuration-of-otel-collector\n\n\nBug fixes:\n* Before this update, manually created routes for the Collector services were unintentionally removed when the Operator pod was restarted. With this update, restarting the Operator pod does not result in the removal of the manually created routes. \nKnown issues:\n* Nothing", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:2789", "url": "https://access.redhat.com/errata/RHSA-2025:2789" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-45336", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2024-56171", "url": "https://access.redhat.com/security/cve/CVE-2024-56171" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-22866", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-24528", "url": "https://access.redhat.com/security/cve/CVE-2025-24528" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2025-24928", "url": "https://access.redhat.com/security/cve/CVE-2025-24928" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/", "url": "https://access.redhat.com/security/updates/classification/" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry", "url": "https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/red_hat_build_of_opentelemetry" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_2789.json" } ], "title": "Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.5.0 release", "tracking": { "current_release_date": "2025-08-14T03:15:08+00:00", "generator": { "date": "2025-08-14T03:15:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:2789", "initial_release_date": "2025-03-13T14:28:17+00:00", "revision_history": [ { "date": "2025-03-13T14:28:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-03-24T14:28:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:15:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift distributed tracing 3.5.2", "product": { "name": "Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift distributed tracing" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-operator-bundle@sha256%3Ad23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3Af9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Ae2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3A0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3A7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3Abf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Affd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3Acced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "product_id": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-collector-rhel8@sha256%3A92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "product_id": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-rhel8-operator@sha256%3Aadb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt" } } }, { "category": "product_version", "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x", "product": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x", "product_id": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x", "product_identification_helper": { "purl": "pkg:oci/opentelemetry-target-allocator-rhel8@sha256%3Ae3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64 as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" }, { "category": "default_component_of", "full_product_name": { "name": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x as a component of Red Hat OpenShift distributed tracing 3.5.2", "product_id": "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" }, "product_reference": "registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x", "relates_to_product_reference": "Red Hat OpenShift distributed tracing 3.5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le" ], "known_not_affected": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-13T14:28:17+00:00", "details": "For details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-56171", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-02-18T23:01:25.366636+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2346416" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. This vulnerability allows a use-after-free via a crafted XML document validated against an XML schema with certain identity constraints or a crafted XML schema.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Use-After-Free in libxml2", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important because it involves a use-after-free flaw in the xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables functions. A maliciously crafted XML document or schema, containing specific identity constraints, can be used to trigger this vulnerability and potentially gain unauthorized access or cause a denial-of-service condition.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "known_not_affected": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-56171" }, { "category": "external", "summary": "RHBZ#2346416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-56171", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56171" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/828" } ], "release_date": "2025-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-13T14:28:17+00:00", "details": "For details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Use-After-Free in libxml2" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le" ], "known_not_affected": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-13T14:28:17+00:00", "details": "For details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" }, { "cve": "CVE-2025-24528", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-01-29T13:47:59.362000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2342796" } ], "notes": [ { "category": "description", "text": "A flaw was found in krb5. With incremental propagation enabled, an authenticated attacker can cause kadmind to write beyond the end of the mapped region for the iprop log file. This issue can trigger a process crash and lead to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: overflow when calculating ulog block size", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-787: Out-of-bounds Write vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software settings, while least functionality reduces the attack surface by disabling unauthorized services and ports. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code exploiting out-of-bounds write vulnerabilities, using mechanisms such as file integrity monitoring and patch management. Robust input validation and error handling ensure all user inputs are thoroughly validated, preventing instability, data exposure, or privilege escalation. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against out-of-bounds write exploits.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "known_not_affected": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24528" }, { "category": "external", "summary": "RHBZ#2342796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2342796" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24528", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24528" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24528", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24528" }, { "category": "external", "summary": "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0", "url": "https://github.com/krb5/krb5/commit/78ceba024b64d49612375be4a12d1c066b0bfbd0" } ], "release_date": "2024-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-13T14:28:17+00:00", "details": "For details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "krb5: overflow when calculating ulog block size" }, { "cve": "CVE-2025-24928", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2025-02-18T23:01:36.502916+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2346421" } ], "notes": [ { "category": "description", "text": "A flaw was found in libxml2. This vulnerability allows a stack-based buffer overflow via DTD validation of an untrusted document or untrusted DTD.", "title": "Vulnerability description" }, { "category": "summary", "text": "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important because it involves a stack-based buffer overflow in the xmlSnprintfElements function within valid.c. Exploiting this issue requires DTD validation to occur on an untrusted document or untrusted DTD, making it a potential security risk for applications using libxml2 that do not adequately restrict DTD input.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "known_not_affected": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24928" }, { "category": "external", "summary": "RHBZ#2346421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2346421" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24928" }, { "category": "external", "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847", "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/847" }, { "category": "external", "summary": "https://issues.oss-fuzz.com/issues/392687022", "url": "https://issues.oss-fuzz.com/issues/392687022" } ], "release_date": "2025-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-13T14:28:17+00:00", "details": "For details on how to apply this update, refer to:\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-upgrading-operators", "product_ids": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2789" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:12407a15fefa30bb851444d27b00e1815970ae085deca7c17537612ec9e4bff6_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:8b7455c14f26b80006568829343688b50ad1c563d339c35f70eb7d561499bc1c_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:92613ae031dd45d85151ff1bd0703ee6bbc6842133cdc51b274769122ea40ac8_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-collector-rhel8@sha256:f9ec6952abc11519409299f0dfffae3b520395cc122d1f2cd375d65492c6aed7_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-operator-bundle@sha256:d23b9c8d0266de7ce5427d125b2749053d2e4b44d632e3eb484775a5eede41b0_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:7e0320614f3be4e8bb1442d5890d2a6cebaf0a1038599d6afbf50daca91e1d65_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:adb1f41e544331b0936c6591edb00c169a9e5a2592c12f6ee55aaab8786ff5ba_s390x", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:e2375ae72ddda9e05e66972adb7bf953bfbf220dcc8b36d6eb1ab76d9e96ff5d_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-rhel8-operator@sha256:ffd6b70068dd4d6bf7a835c0bbf5b934f26ff2b0f5755130dccb099340550083_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:0742729985d0b1ce925bdaaa92c2bb42272902f4c2e93038c0fcf171c7baf03f_amd64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:bf3aa3e5522cf90d82fbd34710e08448a93b88a9876c77415a1027f83a195a81_arm64", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:cced4191c3e84f44eca2ed486592c473f97fd5cd0941edb9d216051802dad3f7_ppc64le", "Red Hat OpenShift distributed tracing 3.5.2:registry.redhat.io/rhosdt/opentelemetry-target-allocator-rhel8@sha256:e3f56102b0cf46e862fc1e015516c5364e49d02cd6ca112b72b1fa3287a96a2d_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "libxml2: Stack-based buffer overflow in xmlSnprintfElements of libxml2" } ] }
rhsa-2025:3772
Vulnerability from csaf_redhat
Published
2025-04-10 01:06
Modified
2025-08-14 03:17
Summary
Red Hat Security Advisory: go-toolset:rhel8 security update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3772", "url": "https://access.redhat.com/errata/RHSA-2025:3772" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2341750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341750" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3772.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security update", "tracking": { "current_release_date": "2025-08-14T03:17:03+00:00", "generator": { "date": "2025-08-14T03:17:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3772", "initial_release_date": "2025-04-10T01:06:33+00:00", "revision_history": [ { "date": "2025-04-10T01:06:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-10T01:06:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:17:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8100020250321121115:a3795dee", "product": { "name": "go-toolset:rhel8:8100020250321121115:a3795dee", "product_id": "go-toolset:rhel8:8100020250321121115:a3795dee", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@rhel8?rpmmod=go-toolset:rhel8:8100020250321121115:a3795dee" } } }, { "category": "product_version", "name": "golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product": { "name": "golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_id": "golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product": { "name": "golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_id": "golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product": { "name": "golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_id": "golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product": { "name": "golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_id": "golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=src" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product_id": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product_id": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_id": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_id": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_id": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_id": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_id": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_id": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.6-1.module%2Bel8.10.0%2B22945%2Bb2c96a17?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, "product_reference": "go-toolset:rhel8:8100020250321121115:a3795dee", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x" }, "product_reference": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src" }, "product_reference": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x" }, "product_reference": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src" }, "product_reference": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64" }, "product_reference": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le" }, "product_reference": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x" }, "product_reference": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64 as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64" }, "product_reference": "golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" }, "product_reference": "golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" }, "product_reference": "golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" }, "product_reference": "golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch as a component of go-toolset:rhel8:8100020250321121115:a3795dee as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" }, "product_reference": "golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:06:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3772" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-45341", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2025-01-23T12:26:31.454000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341750" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "RHBZ#2341750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-10T01:06:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3772" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debuginfo-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:delve-debugsource-0:1.24.1-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:go-toolset-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.src", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.s390x", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-bin-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-docs-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-misc-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-src-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch", "AppStream-8.10.0.Z.MAIN.EUS:go-toolset:rhel8:8100020250321121115:a3795dee:golang-tests-0:1.23.6-1.module+el8.10.0+22945+b2c96a17.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints" } ] }
rhsa-2025:7466
Vulnerability from csaf_redhat
Published
2025-05-13 15:59
Modified
2025-08-14 03:16
Summary
Red Hat Security Advisory: delve and golang security update
Notes
Topic
An update for delve and golang is now available for Red Hat Enterprise Linux 10.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you're using a debugger, things aren't going your way. With that in mind, Delve should stay out of your way as much as possible.
Security Fix(es):
* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)
* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)
* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for delve and golang is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Delve is a debugger for the Go programming language. The goal of the project is to provide a simple, full featured debugging tool for Go. Delve should be easy to invoke and easy to use. Chances are if you\u0027re using a debugger, things aren\u0027t going your way. With that in mind, Delve should stay out of your way as much as possible.\n\nSecurity Fix(es):\n\n* golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (CVE-2024-45341)\n\n* golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect (CVE-2024-45336)\n\n* crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec (CVE-2025-22866)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:7466", "url": "https://access.redhat.com/errata/RHSA-2025:7466" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2341750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341750" }, { "category": "external", "summary": "2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "RHEL-58723", "url": "https://issues.redhat.com/browse/RHEL-58723" }, { "category": "external", "summary": "RHEL-61262", "url": "https://issues.redhat.com/browse/RHEL-61262" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7466.json" } ], "title": "Red Hat Security Advisory: delve and golang security update", "tracking": { "current_release_date": "2025-08-14T03:16:53+00:00", "generator": { "date": "2025-08-14T03:16:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:7466", "initial_release_date": "2025-05-13T15:59:41+00:00", "revision_history": [ { "date": "2025-05-13T15:59:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T15:59:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:16:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.el10_0.src", "product": { "name": "delve-0:1.24.1-1.el10_0.src", "product_id": "delve-0:1.24.1-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.el10_0?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.23.7-1.el10_0.src", "product": { "name": "golang-0:1.23.7-1.el10_0.src", "product_id": "golang-0:1.23.7-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.7-1.el10_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.el10_0.aarch64", "product": { "name": "delve-0:1.24.1-1.el10_0.aarch64", "product_id": "delve-0:1.24.1-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.el10_0.aarch64", "product": { "name": "delve-debugsource-0:1.24.1-1.el10_0.aarch64", "product_id": "delve-debugsource-0:1.24.1-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "product": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "product_id": "delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.7-1.el10_0.aarch64", "product": { "name": "go-toolset-0:1.23.7-1.el10_0.aarch64", "product_id": "go-toolset-0:1.23.7-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.7-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.23.7-1.el10_0.aarch64", "product": { "name": "golang-0:1.23.7-1.el10_0.aarch64", "product_id": "golang-0:1.23.7-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.7-1.el10_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.7-1.el10_0.aarch64", "product": { "name": "golang-bin-0:1.23.7-1.el10_0.aarch64", "product_id": "golang-bin-0:1.23.7-1.el10_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.7-1.el10_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.el10_0.ppc64le", "product": { "name": "delve-0:1.24.1-1.el10_0.ppc64le", "product_id": "delve-0:1.24.1-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "product": { "name": "delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "product_id": "delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "product": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "product_id": "delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.7-1.el10_0.ppc64le", "product": { "name": "go-toolset-0:1.23.7-1.el10_0.ppc64le", "product_id": "go-toolset-0:1.23.7-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.7-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.23.7-1.el10_0.ppc64le", "product": { "name": "golang-0:1.23.7-1.el10_0.ppc64le", "product_id": "golang-0:1.23.7-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.7-1.el10_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.7-1.el10_0.ppc64le", "product": { "name": "golang-bin-0:1.23.7-1.el10_0.ppc64le", "product_id": "golang-bin-0:1.23.7-1.el10_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.7-1.el10_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.24.1-1.el10_0.x86_64", "product": { "name": "delve-0:1.24.1-1.el10_0.x86_64", "product_id": "delve-0:1.24.1-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.24.1-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.24.1-1.el10_0.x86_64", "product": { "name": "delve-debugsource-0:1.24.1-1.el10_0.x86_64", "product_id": "delve-debugsource-0:1.24.1-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.24.1-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "product": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "product_id": "delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.24.1-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.23.7-1.el10_0.x86_64", "product": { "name": "go-toolset-0:1.23.7-1.el10_0.x86_64", "product_id": "go-toolset-0:1.23.7-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.7-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.23.7-1.el10_0.x86_64", "product": { "name": "golang-0:1.23.7-1.el10_0.x86_64", "product_id": "golang-0:1.23.7-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.7-1.el10_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.7-1.el10_0.x86_64", "product": { "name": "golang-bin-0:1.23.7-1.el10_0.x86_64", "product_id": "golang-bin-0:1.23.7-1.el10_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.7-1.el10_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.23.7-1.el10_0.s390x", "product": { "name": "go-toolset-0:1.23.7-1.el10_0.s390x", "product_id": "go-toolset-0:1.23.7-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.23.7-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.23.7-1.el10_0.s390x", "product": { "name": "golang-0:1.23.7-1.el10_0.s390x", "product_id": "golang-0:1.23.7-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.23.7-1.el10_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.23.7-1.el10_0.s390x", "product": { "name": "golang-bin-0:1.23.7-1.el10_0.s390x", "product_id": "golang-bin-0:1.23.7-1.el10_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.23.7-1.el10_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.23.7-1.el10_0.noarch", "product": { "name": "golang-docs-0:1.23.7-1.el10_0.noarch", "product_id": "golang-docs-0:1.23.7-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.23.7-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.23.7-1.el10_0.noarch", "product": { "name": "golang-misc-0:1.23.7-1.el10_0.noarch", "product_id": "golang-misc-0:1.23.7-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.23.7-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.23.7-1.el10_0.noarch", "product": { "name": "golang-src-0:1.23.7-1.el10_0.noarch", "product_id": "golang-src-0:1.23.7-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.23.7-1.el10_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.23.7-1.el10_0.noarch", "product": { "name": "golang-tests-0:1.23.7-1.el10_0.noarch", "product_id": "golang-tests-0:1.23.7-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.23.7-1.el10_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64" }, "product_reference": "delve-0:1.24.1-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le" }, "product_reference": "delve-0:1.24.1-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src" }, "product_reference": "delve-0:1.24.1-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.24.1-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64" }, "product_reference": "delve-0:1.24.1-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le" }, "product_reference": "delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.24.1-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64" }, "product_reference": "delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64" }, "product_reference": "delve-debugsource-0:1.24.1-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le" }, "product_reference": "delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.24.1-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64" }, "product_reference": "delve-debugsource-0:1.24.1-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64" }, "product_reference": "go-toolset-0:1.23.7-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le" }, "product_reference": "go-toolset-0:1.23.7-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x" }, "product_reference": "go-toolset-0:1.23.7-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.23.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64" }, "product_reference": "go-toolset-0:1.23.7-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64" }, "product_reference": "golang-0:1.23.7-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le" }, "product_reference": "golang-0:1.23.7-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x" }, "product_reference": "golang-0:1.23.7-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.7-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src" }, "product_reference": "golang-0:1.23.7-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.23.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64" }, "product_reference": "golang-0:1.23.7-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.7-1.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64" }, "product_reference": "golang-bin-0:1.23.7-1.el10_0.aarch64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.7-1.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le" }, "product_reference": "golang-bin-0:1.23.7-1.el10_0.ppc64le", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.7-1.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x" }, "product_reference": "golang-bin-0:1.23.7-1.el10_0.s390x", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.23.7-1.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64" }, "product_reference": "golang-bin-0:1.23.7-1.el10_0.x86_64", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.23.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch" }, "product_reference": "golang-docs-0:1.23.7-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.23.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch" }, "product_reference": "golang-misc-0:1.23.7-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.23.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch" }, "product_reference": "golang-src-0:1.23.7-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.23.7-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" }, "product_reference": "golang-tests-0:1.23.7-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T15:59:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2024-45341", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2025-01-23T12:26:31.454000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341750" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/x509 package of the Golang standard library. A certificate with a URI, which has a IPv6 address with a zone ID, may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI; this issue only affects users of private PKIs that make use of URIs.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "RHBZ#2341750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45341", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45341" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T15:59:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/x509: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T15:59:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7466" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.src", "AppStream-10.0.Z:delve-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debuginfo-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.aarch64", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.ppc64le", "AppStream-10.0.Z:delve-debugsource-0:1.24.1-1.el10_0.x86_64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:go-toolset-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.src", "AppStream-10.0.Z:golang-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.aarch64", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.ppc64le", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.s390x", "AppStream-10.0.Z:golang-bin-0:1.23.7-1.el10_0.x86_64", "AppStream-10.0.Z:golang-docs-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-misc-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-src-0:1.23.7-1.el10_0.noarch", "AppStream-10.0.Z:golang-tests-0:1.23.7-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
rhea-2025:3039
Vulnerability from csaf_redhat
Published
2025-03-19 15:37
Modified
2025-08-14 03:13
Summary
Red Hat Enhancement Advisory: RHEA: Submariner 0.19.3 - bug fix and enhancement update
Notes
Topic
Submariner 0.19.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.12
Details
Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.
For more information about Submariner, see the Submariner open source community website at: https://submariner.io/.
This advisory contains bug fixes and enhancements to the Submariner container images.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Submariner 0.19.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.12", "title": "Topic" }, { "category": "general", "text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHEA-2025:3039", "url": "https://access.redhat.com/errata/RHEA-2025:3039" }, { "category": "external", "summary": "ACM-17297", "url": "https://issues.redhat.com/browse/ACM-17297" }, { "category": "external", "summary": "HYPBLD-614", "url": "https://issues.redhat.com/browse/HYPBLD-614" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhea-2025_3039.json" } ], "title": "Red Hat Enhancement Advisory: RHEA: Submariner 0.19.3 - bug fix and enhancement update", "tracking": { "current_release_date": "2025-08-14T03:13:24+00:00", "generator": { "date": "2025-08-14T03:13:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHEA-2025:3039", "initial_release_date": "2025-03-19T15:37:55+00:00", "revision_history": [ { "date": "2025-03-19T15:37:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-03-19T15:37:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-14T03:13:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.12::el9" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "product": { "name": "rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "product_id": "rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "product": { "name": "rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "product_id": "rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "product_id": "rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "product_id": "rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.19.3-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "product": { "name": "rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "product_id": "rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "product": { "name": "rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "product_id": "rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "product_id": "rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "product_id": "rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.19.3-3" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "product": { "name": "rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "product_id": "rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "product": { "name": "rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "product_id": "rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "product_id": "rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "product_id": "rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.19.3-3" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "product": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "product_id": "rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "product": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "product_id": "rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "product": { "name": "rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "product_id": "rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "product": { "name": "rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "product_id": "rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "product": { "name": "rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "product_id": "rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "product": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "product_id": "rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel9\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "product_id": "rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "product": { "name": "rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "product_id": "rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel9-operator\u0026tag=v0.19.3-3" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x", "product": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x", "product_id": "rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel9\u0026tag=v0.19.3-3" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64" }, "product_reference": "rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le" }, "product_reference": "rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64" }, "product_reference": "rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64" }, "product_reference": "rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x" }, "product_reference": "rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le" }, "product_reference": "rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x" }, "product_reference": "rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64" }, "product_reference": "rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64" }, "product_reference": "rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le" }, "product_reference": "rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64" }, "product_reference": "rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64" }, "product_reference": "rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64" }, "product_reference": "rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "relates_to_product_reference": "9Base-RHACM-2.12" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.12 for RHEL 9", "product_id": "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" }, "product_reference": "rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x", "relates_to_product_reference": "9Base-RHACM-2.12" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-01-23T12:57:38.123000+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2341751" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http package of the Golang standard library. The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to `a.com/` containing an Authorization header redirected to `b.com/` will not send that header to `b.com`. However, the sensitive headers would be restored if the client received a subsequent same-domain redirect. For example, a chain of redirects from `a.com/`, to `b.com/1`, and finally to `b.com/2` would incorrectly send the Authorization header to `b.com/2`.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64" ], "known_not_affected": [ "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "RHBZ#2341751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2341751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-45336", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" } ], "release_date": "2025-01-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-19T15:37:55+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.12/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2025:3039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: net/http: sensitive headers incorrectly sent after cross-domain redirect" }, { "cve": "CVE-2025-22866", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-02-06T17:00:56.155646+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344219" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Golang crypto/internal/nistec package. Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Considering how this function is used, this leakage is likely insufficient to recover the private key when P-256 is used in any well-known protocols.", "title": "Vulnerability description" }, { "category": "summary", "text": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec", "title": "Vulnerability summary" }, { "category": "other", "text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with account management controls, including integration with single sign-on (SSO), to ensure that user permissions are restricted to only the functions necessary for their roles. Access to sensitive information is explicitly authorized and enforced based on predefined access policies. Event logs are collected and processed for centralization, correlation, analysis, monitoring, reporting, alerting, and retention. This process ensures that audit logs are generated for specific events involving sensitive information, which helps identify patterns of unauthorized access or data exposure. The platform enforces the use of validated cryptographic modules across compute resources to protect the confidentiality of information, even in the event of interception.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64" ], "known_not_affected": [ "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "RHBZ#2344219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22866" }, { "category": "external", "summary": "https://go.dev/cl/643735", "url": "https://go.dev/cl/643735" }, { "category": "external", "summary": "https://go.dev/issue/71383", "url": "https://go.dev/issue/71383" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k", "url": "https://groups.google.com/g/golang-announce/c/xU1ZCHUZw3k" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2025-3447", "url": "https://pkg.go.dev/vuln/GO-2025-3447" } ], "release_date": "2025-02-06T16:54:10.252000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-19T15:37:55+00:00", "details": "To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.12/html/networking/networking#submariner.", "product_ids": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHEA-2025:3039" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9_ppc64le", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16_s390x", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a_amd64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4_arm64", "9Base-RHACM-2.12:rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e_ppc64le", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f_arm64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15_amd64", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b_s390x", "9Base-RHACM-2.12:rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea_ppc64le", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9_s390x", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e_arm64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42_amd64", "9Base-RHACM-2.12:rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705_amd64", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3_s390x", "9Base-RHACM-2.12:rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992_s390x", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692_arm64", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130_amd64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb_s390x", "9Base-RHACM-2.12:rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83_amd64", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc_s390x", "9Base-RHACM-2.12:rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a_arm64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2_ppc64le", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca_amd64", "9Base-RHACM-2.12:rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "crypto/internal/nistec: golang: Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec" } ] }
suse-su-2025:0281-1
Vulnerability from csaf_suse
Published
2025-01-29 07:34
Modified
2025-01-29 07:34
Summary
Security update for go1.22
Notes
Title of the patch
Security update for go1.22
Description of the patch
This update for go1.22 fixes the following issues:
- Update to go1.22.11 (bsc#1218424)
- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)
- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)
Patchnames
SUSE-2025-281,SUSE-SLE-Module-Development-Tools-15-SP6-2025-281,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-281,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-281,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-281,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-281,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-281,SUSE-Storage-7.1-2025-281,openSUSE-SLE-15.6-2025-281
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.22", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.22 fixes the following issues:\n\n- Update to go1.22.11 (bsc#1218424)\n- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)\n- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-281,SUSE-SLE-Module-Development-Tools-15-SP6-2025-281,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-281,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-281,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-281,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-281,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-281,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-281,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-281,SUSE-Storage-7.1-2025-281,openSUSE-SLE-15.6-2025-281", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0281-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0281-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250281-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0281-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020228.html" }, { "category": "self", "summary": "SUSE Bug 1218424", "url": "https://bugzilla.suse.com/1218424" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" } ], "title": "Security update for go1.22", "tracking": { "current_release_date": "2025-01-29T07:34:56Z", "generator": { "date": "2025-01-29T07:34:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0281-1", "initial_release_date": "2025-01-29T07:34:56Z", "revision_history": [ { "date": "2025-01-29T07:34:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-150000.1.39.1.aarch64", "product": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64", "product_id": "go1.22-1.22.11-150000.1.39.1.aarch64" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "product": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "product_id": "go1.22-doc-1.22.11-150000.1.39.1.aarch64" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "product": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "product_id": "go1.22-race-1.22.11-150000.1.39.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-150000.1.39.1.i586", "product": { "name": "go1.22-1.22.11-150000.1.39.1.i586", "product_id": "go1.22-1.22.11-150000.1.39.1.i586" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-150000.1.39.1.i586", "product": { "name": "go1.22-doc-1.22.11-150000.1.39.1.i586", "product_id": "go1.22-doc-1.22.11-150000.1.39.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-150000.1.39.1.ppc64le", "product": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le", "product_id": "go1.22-1.22.11-150000.1.39.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "product": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "product_id": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "product": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "product_id": "go1.22-race-1.22.11-150000.1.39.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-150000.1.39.1.s390x", "product": { "name": "go1.22-1.22.11-150000.1.39.1.s390x", "product_id": "go1.22-1.22.11-150000.1.39.1.s390x" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "product": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "product_id": "go1.22-doc-1.22.11-150000.1.39.1.s390x" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-150000.1.39.1.s390x", "product": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x", "product_id": "go1.22-race-1.22.11-150000.1.39.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-150000.1.39.1.x86_64", "product": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64", "product_id": "go1.22-1.22.11-150000.1.39.1.x86_64" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "product": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "product_id": "go1.22-doc-1.22.11-150000.1.39.1.x86_64" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "product": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "product_id": "go1.22-race-1.22.11-150000.1.39.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-150000.1.39.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-150000.1.39.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-150000.1.39.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-150000.1.39.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T07:34:56Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-race-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-race-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-doc-1.22.11-150000.1.39.1.x86_64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.aarch64", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.ppc64le", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.s390x", "openSUSE Leap 15.6:go1.22-race-1.22.11-150000.1.39.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T07:34:56Z", "details": "moderate" } ], "title": "CVE-2024-45341" } ] }
suse-su-2025:0280-1
Vulnerability from csaf_suse
Published
2025-01-29 07:33
Modified
2025-01-29 07:33
Summary
Security update for go1.23
Notes
Title of the patch
Security update for go1.23
Description of the patch
This update for go1.23 fixes the following issues:
- Update to go1.23.5 (bsc#1229122)
- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)
- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)
Patchnames
SUSE-2025-280,SUSE-SLE-Module-Development-Tools-15-SP6-2025-280,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-280,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-280,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-280,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-280,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-280,SUSE-Storage-7.1-2025-280,openSUSE-SLE-15.6-2025-280
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23 fixes the following issues:\n\n- Update to go1.23.5 (bsc#1229122)\n- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)\n- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-280,SUSE-SLE-Module-Development-Tools-15-SP6-2025-280,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-280,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-280,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-280,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-280,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-280,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-280,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-280,SUSE-Storage-7.1-2025-280,openSUSE-SLE-15.6-2025-280", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0280-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0280-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250280-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0280-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020229.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" } ], "title": "Security update for go1.23", "tracking": { "current_release_date": "2025-01-29T07:33:59Z", "generator": { "date": "2025-01-29T07:33:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0280-1", "initial_release_date": "2025-01-29T07:33:59Z", "revision_history": [ { "date": "2025-01-29T07:33:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-150000.1.18.1.aarch64", "product": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64", "product_id": "go1.23-1.23.5-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "product": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "product_id": "go1.23-doc-1.23.5-150000.1.18.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "product": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "product_id": "go1.23-race-1.23.5-150000.1.18.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-150000.1.18.1.i586", "product": { "name": "go1.23-1.23.5-150000.1.18.1.i586", "product_id": "go1.23-1.23.5-150000.1.18.1.i586" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-150000.1.18.1.i586", "product": { "name": "go1.23-doc-1.23.5-150000.1.18.1.i586", "product_id": "go1.23-doc-1.23.5-150000.1.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-150000.1.18.1.ppc64le", "product": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le", "product_id": "go1.23-1.23.5-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "product": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "product_id": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "product": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "product_id": "go1.23-race-1.23.5-150000.1.18.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-150000.1.18.1.s390x", "product": { "name": "go1.23-1.23.5-150000.1.18.1.s390x", "product_id": "go1.23-1.23.5-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "product": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "product_id": "go1.23-doc-1.23.5-150000.1.18.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-150000.1.18.1.s390x", "product": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x", "product_id": "go1.23-race-1.23.5-150000.1.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-150000.1.18.1.x86_64", "product": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64", "product_id": "go1.23-1.23.5-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "product": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "product_id": "go1.23-doc-1.23.5-150000.1.18.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "product": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "product_id": "go1.23-race-1.23.5-150000.1.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-150000.1.18.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-150000.1.18.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-150000.1.18.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-150000.1.18.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T07:33:59Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-race-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-race-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-doc-1.23.5-150000.1.18.1.x86_64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.aarch64", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.ppc64le", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.s390x", "openSUSE Leap 15.6:go1.23-race-1.23.5-150000.1.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T07:33:59Z", "details": "moderate" } ], "title": "CVE-2024-45341" } ] }
suse-su-2025:0285-1
Vulnerability from csaf_suse
Published
2025-01-29 14:31
Modified
2025-01-29 14:31
Summary
Security update for go1.24
Notes
Title of the patch
Security update for go1.24
Description of the patch
This update for go1.24 fixes the following issues:
This update ships go1.24rc2 (bsc#1236217).
- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)
- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)
- CVE-2025-22865: Avoid panic when parsing partial PKCS#1 private keys (bsc#1236361)
- CVE-2024-45340: Restore netrc preferences for GOAUTH and fix domain lookup (bsc#1236360)
Patchnames
SUSE-2025-285,SUSE-SLE-Module-Development-Tools-15-SP6-2025-285,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-285,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-285,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-285,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-285,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-285,SUSE-Storage-7.1-2025-285,openSUSE-SLE-15.6-2025-285
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.24", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.24 fixes the following issues:\n\n\nThis update ships go1.24rc2 (bsc#1236217).\n\n- CVE-2024-45341: Properly check for IPv6 hosts in URIs (bsc#1236045)\n- CVE-2024-45336: Persist header stripping across repeated redirects (bsc#1236046)\n- CVE-2025-22865: Avoid panic when parsing partial PKCS#1 private keys (bsc#1236361)\n- CVE-2024-45340: Restore netrc preferences for GOAUTH and fix domain lookup (bsc#1236360)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-285,SUSE-SLE-Module-Development-Tools-15-SP6-2025-285,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-285,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-285,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-285,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-285,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-285,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-285,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-285,SUSE-Storage-7.1-2025-285,openSUSE-SLE-15.6-2025-285", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0285-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0285-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250285-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0285-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020234.html" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE Bug 1236217", "url": "https://bugzilla.suse.com/1236217" }, { "category": "self", "summary": "SUSE Bug 1236360", "url": "https://bugzilla.suse.com/1236360" }, { "category": "self", "summary": "SUSE Bug 1236361", "url": "https://bugzilla.suse.com/1236361" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45340 page", "url": "https://www.suse.com/security/cve/CVE-2024-45340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22865 page", "url": "https://www.suse.com/security/cve/CVE-2025-22865/" } ], "title": "Security update for go1.24", "tracking": { "current_release_date": "2025-01-29T14:31:20Z", "generator": { "date": "2025-01-29T14:31:20Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0285-1", "initial_release_date": "2025-01-29T14:31:20Z", "revision_history": [ { "date": "2025-01-29T14:31:20Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-150000.1.3.1.aarch64", "product": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64", "product_id": "go1.24-1.24rc2-150000.1.3.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "product": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "product_id": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "product": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "product_id": "go1.24-race-1.24rc2-150000.1.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-150000.1.3.1.i586", "product": { "name": "go1.24-1.24rc2-150000.1.3.1.i586", "product_id": "go1.24-1.24rc2-150000.1.3.1.i586" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-150000.1.3.1.i586", "product": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.i586", "product_id": "go1.24-doc-1.24rc2-150000.1.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "product": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "product_id": "go1.24-1.24rc2-150000.1.3.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "product": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "product_id": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "product": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "product_id": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-150000.1.3.1.s390x", "product": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x", "product_id": "go1.24-1.24rc2-150000.1.3.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "product": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "product_id": "go1.24-doc-1.24rc2-150000.1.3.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "product": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "product_id": "go1.24-race-1.24rc2-150000.1.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-150000.1.3.1.x86_64", "product": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64", "product_id": "go1.24-1.24rc2-150000.1.3.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "product": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "product_id": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "product": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "product_id": "go1.24-race-1.24rc2-150000.1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-150000.1.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-150000.1.3.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-150000.1.3.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T14:31:20Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45340" } ], "notes": [ { "category": "general", "text": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45340", "url": "https://www.suse.com/security/cve/CVE-2024-45340" }, { "category": "external", "summary": "SUSE Bug 1236360 for CVE-2024-45340", "url": "https://bugzilla.suse.com/1236360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T14:31:20Z", "details": "important" } ], "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T14:31:20Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22865" } ], "notes": [ { "category": "general", "text": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22865", "url": "https://www.suse.com/security/cve/CVE-2025-22865" }, { "category": "external", "summary": "SUSE Bug 1236361 for CVE-2025-22865", "url": "https://bugzilla.suse.com/1236361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Enterprise Storage 7.1:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.24-race-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-doc-1.24rc2-150000.1.3.1.x86_64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.aarch64", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.ppc64le", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.s390x", "openSUSE Leap 15.6:go1.24-race-1.24rc2-150000.1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T14:31:20Z", "details": "important" } ], "title": "CVE-2025-22865" } ] }
suse-su-2025:0429-1
Vulnerability from csaf_suse
Published
2025-02-11 14:12
Modified
2025-02-11 14:12
Summary
Security update for govulncheck-vulndb
Notes
Title of the patch
Security update for govulncheck-vulndb
Description of the patch
This update for govulncheck-vulndb fixes the following issues:
- Update to version 0.0.20250207T224745 2025-02-07T22:47:45Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3456 CVE-2025-24786 GHSA-9r4c-jwx3-3j76
* GO-2025-3457 CVE-2025-24787 GHSA-c7w4-9wv8-7x7c
* GO-2025-3458 CVE-2025-24366 GHSA-vj7w-3m8c-6vpx
- Update to version 0.0.20250206T175003 2025-02-06T17:50:03Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2023-1867 CVE-2022-47930 GHSA-c58h-qv6g-fw74
* GO-2024-3244 CVE-2024-50354 GHSA-cph5-3pgr-c82g
- Update to version 0.0.20250206T165438 2025-02-06T16:54:38Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3428 CVE-2025-22867
* GO-2025-3447 CVE-2025-22866
- Update to version 0.0.20250205T232745 2025-02-05T23:27:45Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3408
* GO-2025-3448 GHSA-23qp-3c2m-xx6w
* GO-2025-3449 GHSA-mx2j-7cmv-353c
* GO-2025-3450 GHSA-w7wm-2425-7p2h
* GO-2025-3454 GHSA-mj4v-hp69-27x5
* GO-2025-3455 GHSA-vqv5-385r-2hf8
- Update to version 0.0.20250205T003520 2025-02-05T00:35:20Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3451
- Update to version 0.0.20250204T220613 2025-02-04T22:06:13Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3431 CVE-2025-24884 GHSA-hcr5-wv4p-h2g2
* GO-2025-3433 CVE-2025-23216 GHSA-47g2-qmh2-749v
* GO-2025-3434 CVE-2025-24376 GHSA-fc89-jghx-8pvg
* GO-2025-3435 CVE-2025-24784 GHSA-756x-m4mj-q96c
* GO-2025-3436 CVE-2025-24883 GHSA-q26p-9cq4-7fc2
* GO-2025-3437 GHSA-274v-mgcv-cm8j
* GO-2025-3438 CVE-2024-11741 GHSA-wxcc-2f3q-4h58
* GO-2025-3442 CVE-2025-24371 GHSA-22qq-3xwm-r5x4
* GO-2025-3443 GHSA-r3r4-g7hq-pq4f
* GO-2025-3444 CVE-2024-35177
* GO-2025-3445 CVE-2024-47770
- Use standard RPM macros to unpack the source and populate a
working directory. Fixes build with RPM 4.20.
- Update to version 0.0.20250130T185858 2025-01-30T18:58:58Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2024-2842 CVE-2024-3727 GHSA-6wvf-f2vw-3425
* GO-2024-3181 CVE-2024-9313 GHSA-x5q3-c8rm-w787
* GO-2024-3188 CVE-2024-9312 GHSA-4gfw-wf7c-w6g2
* GO-2025-3372 CVE-2024-45339 GHSA-6wxm-mpqj-6jpf
* GO-2025-3373 CVE-2024-45341
* GO-2025-3383 CVE-2024-45340
* GO-2025-3408
* GO-2025-3412 CVE-2024-10846 GHSA-36gq-35j3-p9r9
* GO-2025-3420 CVE-2024-45336
* GO-2025-3421 CVE-2025-22865
* GO-2025-3424 CVE-2025-24369
* GO-2025-3426 CVE-2025-0750 GHSA-hp5j-2585-qx6g
* GO-2025-3427 CVE-2024-13484 GHSA-58fx-7v9q-3g56
Patchnames
SUSE-2025-429,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-429,openSUSE-SLE-15.6-2025-429
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for govulncheck-vulndb", "title": "Title of the patch" }, { "category": "description", "text": "This update for govulncheck-vulndb fixes the following issues:\n\n- Update to version 0.0.20250207T224745 2025-02-07T22:47:45Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3456 CVE-2025-24786 GHSA-9r4c-jwx3-3j76\n * GO-2025-3457 CVE-2025-24787 GHSA-c7w4-9wv8-7x7c\n * GO-2025-3458 CVE-2025-24366 GHSA-vj7w-3m8c-6vpx\n\n- Update to version 0.0.20250206T175003 2025-02-06T17:50:03Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2023-1867 CVE-2022-47930 GHSA-c58h-qv6g-fw74\n * GO-2024-3244 CVE-2024-50354 GHSA-cph5-3pgr-c82g\n\n- Update to version 0.0.20250206T165438 2025-02-06T16:54:38Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3428 CVE-2025-22867\n * GO-2025-3447 CVE-2025-22866\n\n- Update to version 0.0.20250205T232745 2025-02-05T23:27:45Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3408\n * GO-2025-3448 GHSA-23qp-3c2m-xx6w\n * GO-2025-3449 GHSA-mx2j-7cmv-353c\n * GO-2025-3450 GHSA-w7wm-2425-7p2h\n * GO-2025-3454 GHSA-mj4v-hp69-27x5\n * GO-2025-3455 GHSA-vqv5-385r-2hf8\n\n- Update to version 0.0.20250205T003520 2025-02-05T00:35:20Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3451\n\n- Update to version 0.0.20250204T220613 2025-02-04T22:06:13Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3431 CVE-2025-24884 GHSA-hcr5-wv4p-h2g2\n * GO-2025-3433 CVE-2025-23216 GHSA-47g2-qmh2-749v\n * GO-2025-3434 CVE-2025-24376 GHSA-fc89-jghx-8pvg\n * GO-2025-3435 CVE-2025-24784 GHSA-756x-m4mj-q96c\n * GO-2025-3436 CVE-2025-24883 GHSA-q26p-9cq4-7fc2\n * GO-2025-3437 GHSA-274v-mgcv-cm8j\n * GO-2025-3438 CVE-2024-11741 GHSA-wxcc-2f3q-4h58\n * GO-2025-3442 CVE-2025-24371 GHSA-22qq-3xwm-r5x4\n * GO-2025-3443 GHSA-r3r4-g7hq-pq4f\n * GO-2025-3444 CVE-2024-35177\n * GO-2025-3445 CVE-2024-47770\n\n- Use standard RPM macros to unpack the source and populate a\n working directory. Fixes build with RPM 4.20.\n\n- Update to version 0.0.20250130T185858 2025-01-30T18:58:58Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2024-2842 CVE-2024-3727 GHSA-6wvf-f2vw-3425\n * GO-2024-3181 CVE-2024-9313 GHSA-x5q3-c8rm-w787\n * GO-2024-3188 CVE-2024-9312 GHSA-4gfw-wf7c-w6g2\n * GO-2025-3372 CVE-2024-45339 GHSA-6wxm-mpqj-6jpf\n * GO-2025-3373 CVE-2024-45341\n * GO-2025-3383 CVE-2024-45340\n * GO-2025-3408\n * GO-2025-3412 CVE-2024-10846 GHSA-36gq-35j3-p9r9\n * GO-2025-3420 CVE-2024-45336\n * GO-2025-3421 CVE-2025-22865\n * GO-2025-3424 CVE-2025-24369\n * GO-2025-3426 CVE-2025-0750 GHSA-hp5j-2585-qx6g\n * GO-2025-3427 CVE-2024-13484 GHSA-58fx-7v9q-3g56\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-429,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-429,openSUSE-SLE-15.6-2025-429", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0429-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0429-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250429-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0429-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" }, { "category": "self", "summary": "SUSE CVE CVE-2022-47930 page", "url": "https://www.suse.com/security/cve/CVE-2022-47930/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-10846 page", "url": "https://www.suse.com/security/cve/CVE-2024-10846/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-11741 page", "url": "https://www.suse.com/security/cve/CVE-2024-11741/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-13484 page", "url": "https://www.suse.com/security/cve/CVE-2024-13484/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-35177 page", "url": "https://www.suse.com/security/cve/CVE-2024-35177/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-3727 page", "url": "https://www.suse.com/security/cve/CVE-2024-3727/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45339 page", "url": "https://www.suse.com/security/cve/CVE-2024-45339/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45340 page", "url": "https://www.suse.com/security/cve/CVE-2024-45340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-47770 page", "url": "https://www.suse.com/security/cve/CVE-2024-47770/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-50354 page", "url": "https://www.suse.com/security/cve/CVE-2024-50354/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-9312 page", "url": "https://www.suse.com/security/cve/CVE-2024-9312/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-9313 page", "url": "https://www.suse.com/security/cve/CVE-2024-9313/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0750 page", "url": "https://www.suse.com/security/cve/CVE-2025-0750/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22865 page", "url": "https://www.suse.com/security/cve/CVE-2025-22865/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22866 page", "url": "https://www.suse.com/security/cve/CVE-2025-22866/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22867 page", "url": "https://www.suse.com/security/cve/CVE-2025-22867/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23216 page", "url": "https://www.suse.com/security/cve/CVE-2025-23216/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24366 page", "url": "https://www.suse.com/security/cve/CVE-2025-24366/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24369 page", "url": "https://www.suse.com/security/cve/CVE-2025-24369/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24371 page", "url": "https://www.suse.com/security/cve/CVE-2025-24371/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24376 page", "url": "https://www.suse.com/security/cve/CVE-2025-24376/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24784 page", "url": "https://www.suse.com/security/cve/CVE-2025-24784/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24786 page", "url": "https://www.suse.com/security/cve/CVE-2025-24786/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24787 page", "url": "https://www.suse.com/security/cve/CVE-2025-24787/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24883 page", "url": "https://www.suse.com/security/cve/CVE-2025-24883/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24884 page", "url": "https://www.suse.com/security/cve/CVE-2025-24884/" } ], "title": "Security update for govulncheck-vulndb", "tracking": { "current_release_date": "2025-02-11T14:12:30Z", "generator": { "date": "2025-02-11T14:12:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0429-1", "initial_release_date": "2025-02-11T14:12:30Z", "revision_history": [ { "date": "2025-02-11T14:12:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "product": { "name": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "product_id": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-47930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-47930" } ], "notes": [ { "category": "general", "text": "An issue was discovered in IO FinNet tss-lib before 2.0.0. The parameter ssid for defining a session id is not used through the MPC implementation, which makes replaying and spoofing of messages easier. In particular, the Schnorr proof of knowledge implemented in sch.go does not utilize a session id, context, or random nonce in the generation of the challenge. This could allow a malicious user or an eavesdropper to replay a valid proof sent in the past.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-47930", "url": "https://www.suse.com/security/cve/CVE-2022-47930" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2022-47930" }, { "cve": "CVE-2024-10846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-10846" } ], "notes": [ { "category": "general", "text": "The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-10846", "url": "https://www.suse.com/security/cve/CVE-2024-10846" }, { "category": "external", "summary": "SUSE Bug 1236335 for CVE-2024-10846", "url": "https://bugzilla.suse.com/1236335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2024-10846" }, { "cve": "CVE-2024-11741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-11741" } ], "notes": [ { "category": "general", "text": "Grafana is an open-source platform for monitoring and observability. \nThe Grafana Alerting VictorOps integration was not properly protected and could be exposed to users with Viewer permission. \nFixed in versions 11.5.0, 11.4.1, 11.3.3, 11.2.6, 11.1.11, 11.0.11 and 10.4.15", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-11741", "url": "https://www.suse.com/security/cve/CVE-2024-11741" }, { "category": "external", "summary": "SUSE Bug 1236734 for CVE-2024-11741", "url": "https://bugzilla.suse.com/1236734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "low" } ], "title": "CVE-2024-11741" }, { "cve": "CVE-2024-13484", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-13484" } ], "notes": [ { "category": "general", "text": "A flaw was found in openshift-gitops-operator-container. The openshift.io/cluster-monitoring label is applied to all namespaces that deploy an ArgoCD CR instance, allowing the namespace to create a rogue PrometheusRule. This issue can have adverse effects on the platform monitoring stack, as the rule is rolled out cluster-wide when the label is applied.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-13484", "url": "https://www.suse.com/security/cve/CVE-2024-13484" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-13484" }, { "cve": "CVE-2024-35177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-35177" } ], "notes": [ { "category": "general", "text": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. The wazuh-agent for Windows is vulnerable to a Local Privilege Escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by placing one of the many DLL that are loaded and not present on the system in the installation folder of the agent OR by replacing the service executable binary itself with a malicious one. The root cause is an improper ACL applied on the installation folder when a non-default installation path is specified (e.g,: C:\\wazuh). Many DLLs are loaded from the installation folder and by creating a malicious DLLs that exports the functions of a legit one (and that is not found on the system where the agent is installed, such as rsync.dll) it is possible to escalate privileges from a low-privileged user and obtain code execution under the context of NT AUTHORITY\\SYSTEM. This issue has been addressed in version 4.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-35177", "url": "https://www.suse.com/security/cve/CVE-2024-35177" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-35177" }, { "cve": "CVE-2024-3727", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-3727" } ], "notes": [ { "category": "general", "text": "A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-3727", "url": "https://www.suse.com/security/cve/CVE-2024-3727" }, { "category": "external", "summary": "SUSE Bug 1224112 for CVE-2024-3727", "url": "https://bugzilla.suse.com/1224112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-3727" }, { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45339" } ], "notes": [ { "category": "general", "text": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process\u0027s log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45339", "url": "https://www.suse.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "SUSE Bug 1236541 for CVE-2024-45339", "url": "https://bugzilla.suse.com/1236541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-45339" }, { "cve": "CVE-2024-45340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45340" } ], "notes": [ { "category": "general", "text": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45340", "url": "https://www.suse.com/security/cve/CVE-2024-45340" }, { "category": "external", "summary": "SUSE Bug 1236360 for CVE-2024-45340", "url": "https://bugzilla.suse.com/1236360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2024-47770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-47770" } ], "notes": [ { "category": "general", "text": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view agent list on Wazuh dashboard with no privilege access. This issue has been addressed in release version 4.9.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-47770", "url": "https://www.suse.com/security/cve/CVE-2024-47770" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2024-47770" }, { "cve": "CVE-2024-50354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-50354" } ], "notes": [ { "category": "general", "text": "gnark is a fast zk-SNARK library that offers a high-level API to design circuits. In gnark 0.11.0 and earlier, deserialization of Groth16 verification keys allocate excessive memory, consuming a lot of resources and triggering a crash with the error fatal error: runtime: out of memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-50354", "url": "https://www.suse.com/security/cve/CVE-2024-50354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2024-50354" }, { "cve": "CVE-2024-9312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-9312" } ], "notes": [ { "category": "general", "text": "Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user\u0027s ID and gain their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-9312", "url": "https://www.suse.com/security/cve/CVE-2024-9312" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-9312" }, { "cve": "CVE-2024-9313", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-9313" } ], "notes": [ { "category": "general", "text": "Authd PAM module before version 0.3.5 can allow broker-managed users to impersonate any other user managed by the same broker and perform any PAM operation with it, including authenticating as them.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-9313", "url": "https://www.suse.com/security/cve/CVE-2024-9313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2024-9313" }, { "cve": "CVE-2025-0750", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0750" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0750", "url": "https://www.suse.com/security/cve/CVE-2025-0750" }, { "category": "external", "summary": "SUSE Bug 1236479 for CVE-2025-0750", "url": "https://bugzilla.suse.com/1236479" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-0750" }, { "cve": "CVE-2025-22865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22865" } ], "notes": [ { "category": "general", "text": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22865", "url": "https://www.suse.com/security/cve/CVE-2025-22865" }, { "category": "external", "summary": "SUSE Bug 1236361 for CVE-2025-22865", "url": "https://bugzilla.suse.com/1236361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2025-22865" }, { "cve": "CVE-2025-22866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22866" } ], "notes": [ { "category": "general", "text": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22866", "url": "https://www.suse.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "SUSE Bug 1236801 for CVE-2025-22866", "url": "https://bugzilla.suse.com/1236801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-22866" }, { "cve": "CVE-2025-22867", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22867" } ], "notes": [ { "category": "general", "text": "On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the @executable_path, @loader_path, or @rpath special values in a \"#cgo LDFLAGS\" directive. This issue only affected go1.24rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22867", "url": "https://www.suse.com/security/cve/CVE-2025-22867" }, { "category": "external", "summary": "SUSE Bug 1236839 for CVE-2025-22867", "url": "https://bugzilla.suse.com/1236839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-22867" }, { "cve": "CVE-2025-23216", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23216" } ], "notes": [ { "category": "general", "text": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. A vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository. The vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data. The vulnerability is fixed in v2.13.4, v2.12.10, and v2.11.13.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23216", "url": "https://www.suse.com/security/cve/CVE-2025-23216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-23216" }, { "cve": "CVE-2025-24366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24366" } ], "notes": [ { "category": "general", "text": "SFTPGo is an open source, event-driven file transfer solution. SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being `rsync`. It is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends. Due to missing sanitization of the client provided `rsync` command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. This issue was fixed in version v2.6.5 by checking the client provided arguments. Users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24366", "url": "https://www.suse.com/security/cve/CVE-2025-24366" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2025-24366" }, { "cve": "CVE-2025-24369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24369" } ], "notes": [ { "category": "general", "text": "Anubis is a tool that allows administrators to protect bots against AI scrapers through bot-checking heuristics and a proof-of-work challenge to discourage scraping from multiple IP addresses. Anubis allows attackers to bypass the bot protection by requesting a challenge, formulates any nonce (such as 42069), and then passes the challenge with difficulty zero. Commit e09d0226a628f04b1d80fd83bee777894a45cd02 fixes this behavior by not using a client-specified difficulty value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24369", "url": "https://www.suse.com/security/cve/CVE-2025-24369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "low" } ], "title": "CVE-2025-24369" }, { "cve": "CVE-2025-24371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24371" } ], "notes": [ { "category": "general", "text": "CometBFT is a distributed, Byzantine fault-tolerant, deterministic state machine replication engine. In the `blocksync` protocol peers send their `base` and `latest` heights when they connect to a new node (`A`), which is syncing to the tip of a network. `base` acts as a lower ground and informs `A` that the peer only has blocks starting from height `base`. `latest` height informs `A` about the latest block in a network. Normally, nodes would only report increasing heights. If `B` fails to provide the latest block, `B` is removed and the `latest` height (target height) is recalculated based on other nodes `latest` heights. The existing code however doesn\u0027t check for the case where `B` first reports `latest` height `X` and immediately after height `Y`, where `X \u003e Y`. `A` will be trying to catch up to 2000 indefinitely. This condition requires the introduction of malicious code in the full node first reporting some non-existing `latest` height, then reporting lower `latest` height and nodes which are syncing using `blocksync` protocol. This issue has been patched in versions 1.0.1 and 0.38.17 and all users are advised to upgrade. Operators may attempt to ban malicious peers from the network as a workaround.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24371", "url": "https://www.suse.com/security/cve/CVE-2025-24371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2025-24371" }, { "cve": "CVE-2025-24376", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24376" } ], "notes": [ { "category": "general", "text": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. By design, AdmissionPolicy and AdmissionPolicyGroup can evaluate only namespaced resources. The resources to be evaluated are determined by the rules provided by the user when defining the policy. There might be Kubernetes namespaced resources that should not be validated by AdmissionPolicy and by the AdmissionPolicyGroup policies because of their sensitive nature. For example, PolicyReport are namespaced resources that contain the list of non compliant objects found inside of a namespace. An attacker can use either an AdmissionPolicy or an AdmissionPolicyGroup to prevent the creation and update of PolicyReport objects to hide non-compliant resources. Moreover, the same attacker might use a mutating AdmissionPolicy to alter the contents of the PolicyReport created inside of the namespace. Starting from the 1.21.0 release, the validation rules applied to AdmissionPolicy and AdmissionPolicyGroup have been tightened to prevent them from validating sensitive types of namespaced resources.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24376", "url": "https://www.suse.com/security/cve/CVE-2025-24376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-24376" }, { "cve": "CVE-2025-24784", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24784" } ], "notes": [ { "category": "general", "text": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. The policy group feature, added to by the 1.17.0 release. By being namespaced, the AdmissionPolicyGroup has a well constrained impact on cluster resources. Hence, it\u0027s considered safe to allow non-admin users to create and manage these resources in the namespaces they own. Kubewarden policies can be allowed to query the Kubernetes API at evaluation time; these types of policies are called \"context aware\". Context aware policies can perform list and get operations against a Kubernetes cluster. The queries are done using the ServiceAccount of the Policy Server instance that hosts the policy. That means that access to the cluster is determined by the RBAC rules that apply to that ServiceAccount. The AdmissionPolicyGroup CRD allowed the deployment of context aware policies. This could allow an attacker to obtain information about resources that are out of their reach, by leveraging a higher access to the cluster granted to the ServiceAccount token used to run the policy. The impact of this vulnerability depends on the privileges that have been granted to the ServiceAccount used to run the Policy Server and assumes that users are using the recommended best practices of keeping the Policy Server\u0027s ServiceAccount least privileged. By default, the Kubewarden helm chart grants access to the following resources (cluster wide) only: Namespace, Pod, Deployment and Ingress. This vulnerability is fixed in 1.21.0.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24784", "url": "https://www.suse.com/security/cve/CVE-2025-24784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-24784" }, { "cve": "CVE-2025-24786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24786" } ], "notes": [ { "category": "general", "text": "WhoDB is an open source database management tool. While the application only displays Sqlite3 databases present in the directory `/db`, there is no path traversal prevention in place. This allows an unauthenticated attacker to open any Sqlite3 database present on the host machine that the application is running on. Affected versions of WhoDB allow users to connect to Sqlite3 databases. By default, the databases must be present in `/db/` (or alternatively `./tmp/` if development mode is enabled). If no databases are present in the default directory, the UI indicates that the user is unable to open any databases. The database file is an user-controlled value. This value is used in `.Join()` with the default directory, in order to get the full path of the database file to open. No checks are performed whether the database file that is eventually opened actually resides in the default directory `/db`. This allows an attacker to use path traversal (`../../`) in order to open any Sqlite3 database present on the system. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24786", "url": "https://www.suse.com/security/cve/CVE-2025-24786" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "critical" } ], "title": "CVE-2025-24786" }, { "cve": "CVE-2025-24787", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24787" } ], "notes": [ { "category": "general", "text": "WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `\u0026allowAllFiles=true` into the connection URI and connecting to any MySQL server (such as an attacker-controlled one), the attacker is able to read local files. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24787", "url": "https://www.suse.com/security/cve/CVE-2025-24787" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2025-24787" }, { "cve": "CVE-2025-24883", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24883" } ], "notes": [ { "category": "general", "text": "go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24883", "url": "https://www.suse.com/security/cve/CVE-2025-24883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "important" } ], "title": "CVE-2025-24883" }, { "cve": "CVE-2025-24884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24884" } ], "notes": [ { "category": "general", "text": "kube-audit-rest is a simple logger of mutation/creation requests to the k8s api. If the \"full-elastic-stack\" example vector configuration was used for a real cluster, the previous values of kubernetes secrets would have been disclosed in the audit messages. This vulnerability is fixed in 1.0.16.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24884", "url": "https://www.suse.com/security/cve/CVE-2025-24884" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250207T224745-150000.1.32.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-02-11T14:12:30Z", "details": "moderate" } ], "title": "CVE-2025-24884" } ] }
suse-su-2025:01731-1
Vulnerability from csaf_suse
Published
2025-05-28 14:33
Modified
2025-05-28 14:33
Summary
Security update for go1.23-openssl
Notes
Title of the patch
Security update for go1.23-openssl
Description of the patch
This update for go1.23-openssl fixes the following issues:
Update to version 1.23.9 (bsc#1229122):
Security fixes:
- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)
- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)
- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
- CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs (bsc#1238572)
- CVE-2025-22871: net/http: reject bare LF in chunked encoding (bsc#1240550)
Patchnames
SUSE-2025-1731,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1731,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1731,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1731,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1731,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1731,SUSE-Storage-7.1-2025-1731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.23-openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.23-openssl fixes the following issues:\n\nUpdate to version 1.23.9 (bsc#1229122):\n\nSecurity fixes:\n\n- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)\n- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)\n- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)\n- CVE-2025-22870: net/http, x/net/proxy, x/net/http/httpproxy: proxy bypass using IPv6 zone IDs (bsc#1238572)\n- CVE-2025-22871: net/http: reject bare LF in chunked encoding (bsc#1240550)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-1731,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1731,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1731,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1731,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1731,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1731,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1731,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1731,SUSE-Storage-7.1-2025-1731", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01731-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:01731-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501731-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:01731-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" }, { "category": "self", "summary": "SUSE Bug 1229122", "url": "https://bugzilla.suse.com/1229122" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE Bug 1236801", "url": "https://bugzilla.suse.com/1236801" }, { "category": "self", "summary": "SUSE Bug 1238572", "url": "https://bugzilla.suse.com/1238572" }, { "category": "self", "summary": "SUSE Bug 1240550", "url": "https://bugzilla.suse.com/1240550" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22866 page", "url": "https://www.suse.com/security/cve/CVE-2025-22866/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22870 page", "url": "https://www.suse.com/security/cve/CVE-2025-22870/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22871 page", "url": "https://www.suse.com/security/cve/CVE-2025-22871/" } ], "title": "Security update for go1.23-openssl", "tracking": { "current_release_date": "2025-05-28T14:33:12Z", "generator": { "date": "2025-05-28T14:33:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:01731-1", "initial_release_date": "2025-05-28T14:33:12Z", "revision_history": [ { "date": "2025-05-28T14:33:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "product": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "product_id": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "product": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "product_id": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "product": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "product_id": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.9-150000.1.9.1.i586", "product": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.i586", "product_id": "go1.23-openssl-1.23.9-150000.1.9.1.i586" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.i586", "product": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.i586", "product_id": "go1.23-openssl-doc-1.23.9-150000.1.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "product": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "product_id": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "product": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "product_id": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "product": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "product_id": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.9-150000.1.9.1.s390x", "product": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.s390x", "product_id": "go1.23-openssl-1.23.9-150000.1.9.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "product": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "product_id": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "product": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "product_id": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "product": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "product_id": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "product": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "product_id": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" } }, { "category": "product_version", "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "product": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "product_id": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" }, "product_reference": "go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-28T14:33:12Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-28T14:33:12Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22866" } ], "notes": [ { "category": "general", "text": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22866", "url": "https://www.suse.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "SUSE Bug 1236801 for CVE-2025-22866", "url": "https://bugzilla.suse.com/1236801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-28T14:33:12Z", "details": "moderate" } ], "title": "CVE-2025-22866" }, { "cve": "CVE-2025-22870", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22870" } ], "notes": [ { "category": "general", "text": "Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to \"*.example.com\", a request to \"[::1%25.example.com]:80` will incorrectly match and not be proxied.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22870", "url": "https://www.suse.com/security/cve/CVE-2025-22870" }, { "category": "external", "summary": "SUSE Bug 1238572 for CVE-2025-22870", "url": "https://bugzilla.suse.com/1238572" }, { "category": "external", "summary": "SUSE Bug 1238611 for CVE-2025-22870", "url": "https://bugzilla.suse.com/1238611" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-28T14:33:12Z", "details": "moderate" } ], "title": "CVE-2025-22870" }, { "cve": "CVE-2025-22871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22871" } ], "notes": [ { "category": "general", "text": "The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22871", "url": "https://www.suse.com/security/cve/CVE-2025-22871" }, { "category": "external", "summary": "SUSE Bug 1240550 for CVE-2025-22871", "url": "https://bugzilla.suse.com/1240550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Enterprise Storage 7.1:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-doc-1.23.9-150000.1.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.23-openssl-race-1.23.9-150000.1.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-28T14:33:12Z", "details": "moderate" } ], "title": "CVE-2025-22871" } ] }
suse-su-2025:0297-1
Vulnerability from csaf_suse
Published
2025-01-30 14:03
Modified
2025-01-30 14:03
Summary
Security update for govulncheck-vulndb
Notes
Title of the patch
Security update for govulncheck-vulndb
Description of the patch
This update for govulncheck-vulndb fixes the following issues:
- Update to version 0.0.20250128T150132 2025-01-28T15:01:32Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3409 CVE-2025-23208 GHSA-c9p4-xwr9-rfhx
* GO-2025-3410 CVE-2025-24337 GHSA-3qc3-mx6x-267h
* GO-2025-3413 CVE-2025-0377 GHSA-wpfp-cm49-9m9q
* GO-2025-3414 CVE-2024-11218 GHSA-5vpc-35f4-r8w6
* GO-2025-3415 CVE-2025-23028 GHSA-9m5p-c77c-f9j7
* GO-2025-3416 CVE-2025-23047 GHSA-h78m-j95m-5356
* GO-2025-3418 CVE-2025-24030 GHSA-j777-63hf-hx76
* GO-2025-3419 CVE-2025-24355 GHSA-v34r-vj4r-38j6
* GO-2025-3422 CVE-2025-24354
- Update to version 0.0.20250128T004730 2025-01-28T00:47:30Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3372 CVE-2024-45339
* GO-2025-3373 CVE-2024-45341
* GO-2025-3383 CVE-2024-45340
* GO-2025-3420 CVE-2024-45336
* GO-2025-3421 CVE-2025-22865
- Update to version 0.0.20250117T214834 2025-01-17T21:48:34Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3392 CVE-2025-20086 GHSA-5m7j-6gc4-ff5g
* GO-2025-3393 CVE-2025-21088 GHSA-8j3q-gc9x-7972
* GO-2025-3394 CVE-2025-20088 GHSA-45v9-w9fh-33j6
* GO-2025-3396 CVE-2024-52594
* GO-2025-3397 CVE-2024-36402 GHSA-8vmr-h7h5-cqhg
* GO-2025-3398 CVE-2024-52791 GHSA-gp86-q8hg-fpxj
* GO-2025-3399 CVE-2024-52602 GHSA-r6jg-jfv6-2fjv
* GO-2025-3400 CVE-2024-56515 GHSA-rcxc-wjgw-579r
* GO-2025-3401 CVE-2024-36403 GHSA-vc2m-hw89-qjxf
* GO-2025-3407 CVE-2025-20621 GHSA-w6xh-c82w-h997
- Update to version 0.0.20250115T172141 2025-01-15T17:21:41Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3381 CVE-2024-56138 GHSA-45v3-38pc-874v
* GO-2025-3382 CVE-2024-51491 GHSA-qjh3-4j3h-vmwp
* GO-2025-3384 CVE-2024-56323 GHSA-32q6-rr98-cjqv
* GO-2025-3390 CVE-2024-53263 GHSA-q6r2-x2cc-vrp7
* GO-2025-3391 CVE-2024-52281 GHSA-2v2w-8v8c-wcm9
- Update to version 0.0.20250109T194159 2025-01-09T19:41:59Z.
Refs jsc#PED-11136
Go CVE Numbering Authority IDs added or updated with aliases:
* GO-2025-3376 CVE-2025-22149 GHSA-675f-rq2r-jw82
* GO-2025-3377 CVE-2025-22449 GHSA-q8fg-cp3q-5jwm
* GO-2025-3379 CVE-2025-20033 GHSA-2549-xh72-qrpm
* GO-2025-3380 CVE-2025-22445 GHSA-7rgp-4j56-fm79
Patchnames
SUSE-2025-297,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-297,openSUSE-SLE-15.6-2025-297
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for govulncheck-vulndb", "title": "Title of the patch" }, { "category": "description", "text": "This update for govulncheck-vulndb fixes the following issues:\n\n- Update to version 0.0.20250128T150132 2025-01-28T15:01:32Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3409 CVE-2025-23208 GHSA-c9p4-xwr9-rfhx\n * GO-2025-3410 CVE-2025-24337 GHSA-3qc3-mx6x-267h\n * GO-2025-3413 CVE-2025-0377 GHSA-wpfp-cm49-9m9q\n * GO-2025-3414 CVE-2024-11218 GHSA-5vpc-35f4-r8w6\n * GO-2025-3415 CVE-2025-23028 GHSA-9m5p-c77c-f9j7\n * GO-2025-3416 CVE-2025-23047 GHSA-h78m-j95m-5356\n * GO-2025-3418 CVE-2025-24030 GHSA-j777-63hf-hx76\n * GO-2025-3419 CVE-2025-24355 GHSA-v34r-vj4r-38j6\n * GO-2025-3422 CVE-2025-24354\n\n- Update to version 0.0.20250128T004730 2025-01-28T00:47:30Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3372 CVE-2024-45339\n * GO-2025-3373 CVE-2024-45341\n * GO-2025-3383 CVE-2024-45340\n * GO-2025-3420 CVE-2024-45336\n * GO-2025-3421 CVE-2025-22865\n\n- Update to version 0.0.20250117T214834 2025-01-17T21:48:34Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3392 CVE-2025-20086 GHSA-5m7j-6gc4-ff5g\n * GO-2025-3393 CVE-2025-21088 GHSA-8j3q-gc9x-7972\n * GO-2025-3394 CVE-2025-20088 GHSA-45v9-w9fh-33j6\n * GO-2025-3396 CVE-2024-52594\n * GO-2025-3397 CVE-2024-36402 GHSA-8vmr-h7h5-cqhg\n * GO-2025-3398 CVE-2024-52791 GHSA-gp86-q8hg-fpxj\n * GO-2025-3399 CVE-2024-52602 GHSA-r6jg-jfv6-2fjv\n * GO-2025-3400 CVE-2024-56515 GHSA-rcxc-wjgw-579r\n * GO-2025-3401 CVE-2024-36403 GHSA-vc2m-hw89-qjxf\n * GO-2025-3407 CVE-2025-20621 GHSA-w6xh-c82w-h997\n\n- Update to version 0.0.20250115T172141 2025-01-15T17:21:41Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3381 CVE-2024-56138 GHSA-45v3-38pc-874v\n * GO-2025-3382 CVE-2024-51491 GHSA-qjh3-4j3h-vmwp\n * GO-2025-3384 CVE-2024-56323 GHSA-32q6-rr98-cjqv\n * GO-2025-3390 CVE-2024-53263 GHSA-q6r2-x2cc-vrp7\n * GO-2025-3391 CVE-2024-52281 GHSA-2v2w-8v8c-wcm9\n\n- Update to version 0.0.20250109T194159 2025-01-09T19:41:59Z.\n Refs jsc#PED-11136\n Go CVE Numbering Authority IDs added or updated with aliases:\n * GO-2025-3376 CVE-2025-22149 GHSA-675f-rq2r-jw82\n * GO-2025-3377 CVE-2025-22449 GHSA-q8fg-cp3q-5jwm\n * GO-2025-3379 CVE-2025-20033 GHSA-2549-xh72-qrpm\n * GO-2025-3380 CVE-2025-22445 GHSA-7rgp-4j56-fm79\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-297,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-297,openSUSE-SLE-15.6-2025-297", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0297-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0297-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250297-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0297-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" }, { "category": "self", "summary": "SUSE CVE CVE-2024-11218 page", "url": "https://www.suse.com/security/cve/CVE-2024-11218/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-36402 page", "url": "https://www.suse.com/security/cve/CVE-2024-36402/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-36403 page", "url": "https://www.suse.com/security/cve/CVE-2024-36403/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45339 page", "url": "https://www.suse.com/security/cve/CVE-2024-45339/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45340 page", "url": "https://www.suse.com/security/cve/CVE-2024-45340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-51491 page", "url": "https://www.suse.com/security/cve/CVE-2024-51491/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52281 page", "url": "https://www.suse.com/security/cve/CVE-2024-52281/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52594 page", "url": "https://www.suse.com/security/cve/CVE-2024-52594/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52602 page", "url": "https://www.suse.com/security/cve/CVE-2024-52602/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52791 page", "url": "https://www.suse.com/security/cve/CVE-2024-52791/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-53263 page", "url": "https://www.suse.com/security/cve/CVE-2024-53263/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56138 page", "url": "https://www.suse.com/security/cve/CVE-2024-56138/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56323 page", "url": "https://www.suse.com/security/cve/CVE-2024-56323/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-56515 page", "url": "https://www.suse.com/security/cve/CVE-2024-56515/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0377 page", "url": "https://www.suse.com/security/cve/CVE-2025-0377/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-20033 page", "url": "https://www.suse.com/security/cve/CVE-2025-20033/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-20086 page", "url": "https://www.suse.com/security/cve/CVE-2025-20086/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-20088 page", "url": "https://www.suse.com/security/cve/CVE-2025-20088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-20621 page", "url": "https://www.suse.com/security/cve/CVE-2025-20621/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-21088 page", "url": "https://www.suse.com/security/cve/CVE-2025-21088/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22149 page", "url": "https://www.suse.com/security/cve/CVE-2025-22149/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22445 page", "url": "https://www.suse.com/security/cve/CVE-2025-22445/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22449 page", "url": "https://www.suse.com/security/cve/CVE-2025-22449/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22865 page", "url": "https://www.suse.com/security/cve/CVE-2025-22865/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23028 page", "url": "https://www.suse.com/security/cve/CVE-2025-23028/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23047 page", "url": "https://www.suse.com/security/cve/CVE-2025-23047/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23208 page", "url": "https://www.suse.com/security/cve/CVE-2025-23208/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24030 page", "url": "https://www.suse.com/security/cve/CVE-2025-24030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24337 page", "url": "https://www.suse.com/security/cve/CVE-2025-24337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24354 page", "url": "https://www.suse.com/security/cve/CVE-2025-24354/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24355 page", "url": "https://www.suse.com/security/cve/CVE-2025-24355/" } ], "title": "Security update for govulncheck-vulndb", "tracking": { "current_release_date": "2025-01-30T14:03:37Z", "generator": { "date": "2025-01-30T14:03:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0297-1", "initial_release_date": "2025-01-30T14:03:37Z", "revision_history": [ { "date": "2025-01-30T14:03:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "product": { "name": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "product_id": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP6", "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-11218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-11218" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-11218", "url": "https://www.suse.com/security/cve/CVE-2024-11218" }, { "category": "external", "summary": "SUSE Bug 1236269 for CVE-2024-11218", "url": "https://bugzilla.suse.com/1236269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2024-11218" }, { "cve": "CVE-2024-36402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-36402" } ], "notes": [ { "category": "general", "text": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. MMR 1.3.5 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector. Though extremely limited, server operators can use more strict rate limits based on IP address as a partial workaround.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-36402", "url": "https://www.suse.com/security/cve/CVE-2024-36402" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-36402" }, { "cve": "CVE-2024-36403", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-36403" } ], "notes": [ { "category": "general", "text": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR before version 1.3.5 is vulnerable to unbounded disk consumption, where an unauthenticated adversary can induce it to download and cache large amounts of remote media files. MMR\u0027s typical operating environment uses S3-like storage as a backend, with file-backed store as an alternative option. Instances using a file-backed store or those which self-host an S3 storage system are therefore vulnerable to a disk fill attack. Once the disk is full, authenticated users will be unable to upload new media, resulting in denial of service. For instances configured to use a cloud-based S3 storage option, this could result in high service fees instead of a denial of service. MMR 1.3.5 introduces a new default-on \"leaky bucket\" rate limit to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user\u0027s ability to request large amounts of data. Operators should note that the leaky bucket implementation introduced in MMR 1.3.5 requires the IP address associated with the request to be forwarded, to avoid mistakenly applying the rate limit to the reverse proxy instead. To avoid this issue, the reverse proxy should populate the X-Forwarded-For header when sending the request to MMR. Operators who cannot update may wish to lower the maximum file size they allow and implement harsh rate limits, though this can still lead to a large amount of data to be downloaded.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-36403", "url": "https://www.suse.com/security/cve/CVE-2024-36403" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-36403" }, { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45339" } ], "notes": [ { "category": "general", "text": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process\u0027s log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45339", "url": "https://www.suse.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "SUSE Bug 1236541 for CVE-2024-45339", "url": "https://bugzilla.suse.com/1236541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2024-45339" }, { "cve": "CVE-2024-45340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45340" } ], "notes": [ { "category": "general", "text": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45340", "url": "https://www.suse.com/security/cve/CVE-2024-45340" }, { "category": "external", "summary": "SUSE Bug 1236360 for CVE-2024-45340", "url": "https://bugzilla.suse.com/1236360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2024-51491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-51491" } ], "notes": [ { "category": "general", "text": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. The issue was identified during Quarkslab\u0027s security audit on the Certificate Revocation List (CRL) based revocation check feature.\nAfter retrieving the CRL, notation-go attempts to update the CRL cache using the os.Rename method. However, this operation may fail due to operating system-specific limitations, particularly when the source and destination paths are on different mount points. This failure could lead to an unexpected program termination. In method `crl.(*FileCache).Set`, a temporary file is created in the OS dedicated area (like /tmp for, usually, Linux/Unix). The file is written and then it is tried to move it to the dedicated `notation` cache directory thanks `os.Rename`. As specified in Go documentation, OS specific restriction may apply. When used with Linux OS, it is relying on rename syscall from the libc and as per the documentation, moving a file to a different mountpoint raises an EXDEV error, interpreted as Cross device link not permitted error. Some Linux distribution, like RedHat use a dedicated filesystem (tmpfs), mounted on a specific mountpoint (usually /tmp) for temporary files. When using such OS, revocation check based on CRL will repeatedly crash notation. As a result the signature verification process is aborted as process crashes. This issue has been addressed in version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-51491", "url": "https://www.suse.com/security/cve/CVE-2024-51491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "low" } ], "title": "CVE-2024-51491" }, { "cve": "CVE-2024-52281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52281" } ], "notes": [ { "category": "general", "text": "A: Improper Neutralization of Input During Web Page Generation vulnerability in SUSE rancher allows a malicious actor to perform a Stored XSS attack through the cluster description field.\nThis issue affects rancher: from 2.9.0 before 2.9.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52281", "url": "https://www.suse.com/security/cve/CVE-2024-52281" }, { "category": "external", "summary": "SUSE Bug 1233339 for CVE-2024-52281", "url": "https://bugzilla.suse.com/1233339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2024-52281" }, { "cve": "CVE-2024-52594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52594" } ], "notes": [ { "category": "general", "text": "Gomatrixserverlib is a Go library for matrix federation. Gomatrixserverlib is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. The commit `c4f1e01` fixes this issue. Users are advised to upgrade. Users unable to upgrade should use a local firewall to limit the network segments and hosts the service using gomatrixserverlib can access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52594", "url": "https://www.suse.com/security/cve/CVE-2024-52594" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-52594" }, { "cve": "CVE-2024-52602", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52602" } ], "notes": [ { "category": "general", "text": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. Matrix Media Repo (MMR) is vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions. This is fixed in MMR v1.3.8. Users are advised to upgrade. Restricting which hosts MMR is allowed to contact via (local) firewall rules or a transparent proxy and may provide a workaround for users unable to upgrade.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52602", "url": "https://www.suse.com/security/cve/CVE-2024-52602" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-52602" }, { "cve": "CVE-2024-52791", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52791" } ], "notes": [ { "category": "general", "text": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52791", "url": "https://www.suse.com/security/cve/CVE-2024-52791" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-52791" }, { "cve": "CVE-2024-53263", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-53263" } ], "notes": [ { "category": "general", "text": "Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host\u0027s URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user\u0027s Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-53263", "url": "https://www.suse.com/security/cve/CVE-2024-53263" }, { "category": "external", "summary": "SUSE Bug 1235876 for CVE-2024-53263", "url": "https://bugzilla.suse.com/1235876" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2024-53263" }, { "cve": "CVE-2024-56138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56138" } ], "notes": [ { "category": "general", "text": "notion-go is a collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications. This issue was identified during Quarkslab\u0027s audit of the timestamp feature. During the timestamp signature generation, the revocation status of the certificate(s) used to generate the timestamp signature was not verified. During timestamp signature generation, notation-go did not check the revocation status of the certificate chain used by the TSA. This oversight creates a vulnerability that could be exploited through a Man-in-The-Middle attack. An attacker could potentially use a compromised, intermediate, or revoked leaf certificate to generate a malicious countersignature, which would then be accepted and stored by `notation`. This could lead to denial of service scenarios, particularly in CI/CD environments during signature verification processes because timestamp signature would fail due to the presence of a revoked certificate(s) potentially disrupting operations. This issue has been addressed in release version 1.3.0-rc.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56138", "url": "https://www.suse.com/security/cve/CVE-2024-56138" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "low" } ], "title": "CVE-2024-56138" }, { "cve": "CVE-2024-56323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56323" } ], "notes": [ { "category": "general", "text": "OpenFGA is an authorization/permission engine. IN OpenFGA v1.3.8 to v1.8.2 (Helm chart openfga-0.1.38 to openfga-0.2.19, docker v1.3.8 to v.1.8.2) are vulnerable to authorization bypass under the following conditions: 1. calling Check API or ListObjects with a model that uses [conditions](https://openfga.dev/docs/modeling/conditions), and 2. calling Check API or ListObjects API with [contextual tuples](https://openfga.dev/docs/concepts#what-are-contextual-tuples) that include conditions and 3. OpenFGA is configured with caching enabled (`OPENFGA_CHECK_QUERY_CACHE_ENABLED`). Users are advised to upgrade to v1.8.3. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56323", "url": "https://www.suse.com/security/cve/CVE-2024-56323" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-56323" }, { "cve": "CVE-2024-56515", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-56515" } ], "notes": [ { "category": "general", "text": "Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. If SVG or JPEGXL thumbnailers are enabled (they are disabled by default), a user may upload a file which claims to be either of these types and request a thumbnail to invoke a different decoder in ImageMagick. In some ImageMagick installations, this includes the capability to run Ghostscript to decode the image/file. If MP4 thumbnailers are enabled (also disabled by default), the same issue as above may occur with the ffmpeg installation instead. MMR uses a number of other decoders for all other file types when preparing thumbnails. Theoretical issues are possible with these decoders, however in testing they were not possible to exploit. This is fixed in MMR v1.3.8. MMR now inspects the mimetype of media prior to thumbnailing, and picks a thumbnailer based on those results instead of relying on user-supplied values. This may lead to fewer thumbnails when obscure file shapes are used. This also helps narrow scope of theoretical issues with all decoders MMR uses for thumbnails. Users are advised to upgrade. Users unable to upgrade may disable the SVG, JPEGXL, and MP4 thumbnail types in the MMR config which prevents the decoders from being invoked. Further disabling uncommon file types on the server is recommended to limit risk surface. Containers and other similar technologies may also be used to limit the impact of vulnerabilities in external decoders, like ImageMagick and ffmpeg. Some installations of ImageMagick may disable \"unsafe\" file types, like PDFs, already. This option can be replicated to other environments as needed. ffmpeg may be compiled with limited decoders/codecs. The Docker image for MMR disables PDFs and similar formats by default.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-56515", "url": "https://www.suse.com/security/cve/CVE-2024-56515" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2024-56515" }, { "cve": "CVE-2025-0377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0377" } ], "notes": [ { "category": "general", "text": "HashiCorp\u0027s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0377", "url": "https://www.suse.com/security/cve/CVE-2025-0377" }, { "category": "external", "summary": "SUSE Bug 1236209 for CVE-2025-0377", "url": "https://bugzilla.suse.com/1236209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-0377" }, { "cve": "CVE-2025-20033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-20033" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-20033", "url": "https://www.suse.com/security/cve/CVE-2025-20033" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-20033" }, { "cve": "CVE-2025-20086", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-20086" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.2.x \u003c= 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-20086", "url": "https://www.suse.com/security/cve/CVE-2025-20086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-20086" }, { "cve": "CVE-2025-20088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-20088" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.2.x \u003c= 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-20088", "url": "https://www.suse.com/security/cve/CVE-2025-20088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-20088" }, { "cve": "CVE-2025-20621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-20621" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.2.x \u003c= 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly handle posts with attachments containing fields that cannot be cast to a String, which allows an attacker to cause the webapp to crash via creating and sending such a post to a channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-20621", "url": "https://www.suse.com/security/cve/CVE-2025-20621" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-20621" }, { "cve": "CVE-2025-21088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-21088" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.2.x \u003c= 10.2.0, 9.11.x \u003c= 9.11.5, 10.0.x \u003c= 10.0.3, 10.1.x \u003c= 10.1.3 fail to properly validate the style of proto supplied to an action\u0027s style in post.props.attachments, which allows an attacker to crash the frontend via crafted malicious input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-21088", "url": "https://www.suse.com/security/cve/CVE-2025-21088" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-21088" }, { "cve": "CVE-2025-22149", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22149" } ], "notes": [ { "category": "general", "text": "JWK Set (JSON Web Key Set) is a JWK and JWK Set Go implementation. Prior to 0.6.0, the project\u0027s provided HTTP client\u0027s local JWK Set cache should do a full replacement when the goroutine refreshes the remote JWK Set. The current behavior is to overwrite or append. This is a security issue for use cases that utilize the provided auto-caching HTTP client and where key removal from a JWK Set is equivalent to revocation. The affected auto-caching HTTP client was added in version v0.5.0 and fixed in v0.6.0. The only workaround would be to remove the provided auto-caching HTTP client and replace it with a custom implementation. This involves setting the HTTPClientStorageOptions.RefreshInterval to zero (or not specifying the value).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22149", "url": "https://www.suse.com/security/cve/CVE-2025-22149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "low" } ], "title": "CVE-2025-22149" }, { "cve": "CVE-2025-22445", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22445" } ], "notes": [ { "category": "general", "text": "Mattermost versions 10.x \u003c= 10.2 fail to accurately reflect missing settings, which allows confusion for admins regarding a Calls security-sensitive configuration via incorrect UI reporting.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22445", "url": "https://www.suse.com/security/cve/CVE-2025-22445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "low" } ], "title": "CVE-2025-22445" }, { "cve": "CVE-2025-22449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22449" } ], "notes": [ { "category": "general", "text": "Mattermost versions 9.11.x \u003c= 9.11.5 fail to enforce invite permissions, which allows team admins, with no permission to invite users to their team, to invite users by updating the \"allow_open_invite\" field via making their team public.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22449", "url": "https://www.suse.com/security/cve/CVE-2025-22449" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "low" } ], "title": "CVE-2025-22449" }, { "cve": "CVE-2025-22865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22865" } ], "notes": [ { "category": "general", "text": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22865", "url": "https://www.suse.com/security/cve/CVE-2025-22865" }, { "category": "external", "summary": "SUSE Bug 1236361 for CVE-2025-22865", "url": "https://bugzilla.suse.com/1236361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-22865" }, { "cve": "CVE-2025-23028", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23028" } ], "notes": [ { "category": "general", "text": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. No known workarounds are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23028", "url": "https://www.suse.com/security/cve/CVE-2025-23028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-23028" }, { "cve": "CVE-2025-23047", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23047" } ], "notes": [ { "category": "general", "text": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23047", "url": "https://www.suse.com/security/cve/CVE-2025-23047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-23047" }, { "cve": "CVE-2025-23208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23208" } ], "notes": [ { "category": "general", "text": "zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn\u0027t obvious to me if it were the case. Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. This issue has been addressed in version 2.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23208", "url": "https://www.suse.com/security/cve/CVE-2025-23208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-23208" }, { "cve": "CVE-2025-24030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24030" } ], "notes": [ { "category": "general", "text": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24030", "url": "https://www.suse.com/security/cve/CVE-2025-24030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-24030" }, { "cve": "CVE-2025-24337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24337" } ], "notes": [ { "category": "general", "text": "WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24337", "url": "https://www.suse.com/security/cve/CVE-2025-24337" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-24337" }, { "cve": "CVE-2025-24354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24354" } ], "notes": [ { "category": "general", "text": "imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24354", "url": "https://www.suse.com/security/cve/CVE-2025-24354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "moderate" } ], "title": "CVE-2025-24354" }, { "cve": "CVE-2025-24355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24355" } ], "notes": [ { "category": "general", "text": "Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24355", "url": "https://www.suse.com/security/cve/CVE-2025-24355" }, { "category": "external", "summary": "SUSE Bug 1236404 for CVE-2025-24355", "url": "https://bugzilla.suse.com/1236404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Package Hub 15 SP6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch", "openSUSE Leap 15.6:govulncheck-vulndb-0.0.20250128T150132-150000.1.29.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2025-01-30T14:03:37Z", "details": "important" } ], "title": "CVE-2025-24355" } ] }
suse-su-2025:1555-1
Vulnerability from csaf_suse
Published
2025-05-15 05:05
Modified
2025-05-15 05:05
Summary
Security update for go1.22-openssl
Notes
Title of the patch
Security update for go1.22-openssl
Description of the patch
This update for go1.22-openssl fixes the following issues:
Update to version 1.22.12 (bsc#1218424):
Security fixes:
- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)
- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)
- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)
Patchnames
SUSE-2025-1555,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1555,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1555,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1555,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1555,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1555,SUSE-Storage-7.1-2025-1555
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for go1.22-openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for go1.22-openssl fixes the following issues:\n\nUpdate to version 1.22.12 (bsc#1218424):\n\nSecurity fixes:\n\n- CVE-2024-45336: net/http: sensitive headers incorrectly sent after cross-domain redirect (bsc#1236046)\n- CVE-2024-45341: crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints (bsc#1236045)\n- CVE-2025-22866: crypto/internal/fips140/nistec: p256NegCond is variable time on ppc64le (bsc#1236801)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-1555,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1555,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1555,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1555,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1555,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1555,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1555,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1555,SUSE-Storage-7.1-2025-1555", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1555-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:1555-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251555-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:1555-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-May/039220.html" }, { "category": "self", "summary": "SUSE Bug 1218424", "url": "https://bugzilla.suse.com/1218424" }, { "category": "self", "summary": "SUSE Bug 1236045", "url": "https://bugzilla.suse.com/1236045" }, { "category": "self", "summary": "SUSE Bug 1236046", "url": "https://bugzilla.suse.com/1236046" }, { "category": "self", "summary": "SUSE Bug 1236801", "url": "https://bugzilla.suse.com/1236801" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22866 page", "url": "https://www.suse.com/security/cve/CVE-2025-22866/" } ], "title": "Security update for go1.22-openssl", "tracking": { "current_release_date": "2025-05-15T05:05:53Z", "generator": { "date": "2025-05-15T05:05:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:1555-1", "initial_release_date": "2025-05-15T05:05:53Z", "revision_history": [ { "date": "2025-05-15T05:05:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "product": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "product_id": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64" } }, { "category": "product_version", "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "product": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "product_id": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" } }, { "category": "product_version", "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "product": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "product_id": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.22-openssl-1.22.12-150000.1.12.1.i586", "product": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.i586", "product_id": "go1.22-openssl-1.22.12-150000.1.12.1.i586" } }, { "category": "product_version", "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.i586", "product": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.i586", "product_id": "go1.22-openssl-doc-1.22.12-150000.1.12.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "product": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "product_id": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "product": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "product_id": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "product": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "product_id": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.22-openssl-1.22.12-150000.1.12.1.s390x", "product": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.s390x", "product_id": "go1.22-openssl-1.22.12-150000.1.12.1.s390x" } }, { "category": "product_version", "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "product": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "product_id": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x" } }, { "category": "product_version", "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "product": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "product_id": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "product": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "product_id": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64" } }, { "category": "product_version", "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "product": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "product_id": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" } }, { "category": "product_version", "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "product": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "product_id": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" }, "product_reference": "go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-15T05:05:53Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-15T05:05:53Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22866" } ], "notes": [ { "category": "general", "text": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22866", "url": "https://www.suse.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "SUSE Bug 1236801 for CVE-2025-22866", "url": "https://bugzilla.suse.com/1236801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Enterprise Storage 7.1:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-doc-1.22.12-150000.1.12.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:go1.22-openssl-race-1.22.12-150000.1.12.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-05-15T05:05:53Z", "details": "moderate" } ], "title": "CVE-2025-22866" } ] }
opensuse-su-2025:15030-1
Vulnerability from csaf_opensuse
Published
2025-04-25 00:00
Modified
2025-04-25 00:00
Summary
opentofu-1.9.1-1.1 on GA media
Notes
Title of the patch
opentofu-1.9.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the opentofu-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15030
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "opentofu-1.9.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the opentofu-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15030", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15030-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:15030-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLAZMF6OXHA44LELUVOL3F5GAUV5PW3Y/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:15030-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLAZMF6OXHA44LELUVOL3F5GAUV5PW3Y/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22866 page", "url": "https://www.suse.com/security/cve/CVE-2025-22866/" } ], "title": "opentofu-1.9.1-1.1 on GA media", "tracking": { "current_release_date": "2025-04-25T00:00:00Z", "generator": { "date": "2025-04-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15030-1", "initial_release_date": "2025-04-25T00:00:00Z", "revision_history": [ { "date": "2025-04-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "opentofu-1.9.1-1.1.aarch64", "product": { "name": "opentofu-1.9.1-1.1.aarch64", "product_id": "opentofu-1.9.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "opentofu-1.9.1-1.1.ppc64le", "product": { "name": "opentofu-1.9.1-1.1.ppc64le", "product_id": "opentofu-1.9.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "opentofu-1.9.1-1.1.s390x", "product": { "name": "opentofu-1.9.1-1.1.s390x", "product_id": "opentofu-1.9.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "opentofu-1.9.1-1.1.x86_64", "product": { "name": "opentofu-1.9.1-1.1.x86_64", "product_id": "opentofu-1.9.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "opentofu-1.9.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64" }, "product_reference": "opentofu-1.9.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "opentofu-1.9.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le" }, "product_reference": "opentofu-1.9.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "opentofu-1.9.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x" }, "product_reference": "opentofu-1.9.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "opentofu-1.9.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" }, "product_reference": "opentofu-1.9.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22866", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22866" } ], "notes": [ { "category": "general", "text": "Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22866", "url": "https://www.suse.com/security/cve/CVE-2025-22866" }, { "category": "external", "summary": "SUSE Bug 1236801 for CVE-2025-22866", "url": "https://bugzilla.suse.com/1236801" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:opentofu-1.9.1-1.1.aarch64", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.ppc64le", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.s390x", "openSUSE Tumbleweed:opentofu-1.9.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-04-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-22866" } ] }
opensuse-su-2025:14710-1
Vulnerability from csaf_opensuse
Published
2025-01-29 00:00
Modified
2025-01-29 00:00
Summary
govulncheck-vulndb-0.0.20250128T150132-1.1 on GA media
Notes
Title of the patch
govulncheck-vulndb-0.0.20250128T150132-1.1 on GA media
Description of the patch
These are all security issues fixed in the govulncheck-vulndb-0.0.20250128T150132-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14710
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "govulncheck-vulndb-0.0.20250128T150132-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250128T150132-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14710", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14710-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2024-11218 page", "url": "https://www.suse.com/security/cve/CVE-2024-11218/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45339 page", "url": "https://www.suse.com/security/cve/CVE-2024-45339/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45340 page", "url": "https://www.suse.com/security/cve/CVE-2024-45340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-0377 page", "url": "https://www.suse.com/security/cve/CVE-2025-0377/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22865 page", "url": "https://www.suse.com/security/cve/CVE-2025-22865/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23028 page", "url": "https://www.suse.com/security/cve/CVE-2025-23028/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23047 page", "url": "https://www.suse.com/security/cve/CVE-2025-23047/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-23208 page", "url": "https://www.suse.com/security/cve/CVE-2025-23208/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24030 page", "url": "https://www.suse.com/security/cve/CVE-2025-24030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24337 page", "url": "https://www.suse.com/security/cve/CVE-2025-24337/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24354 page", "url": "https://www.suse.com/security/cve/CVE-2025-24354/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24355 page", "url": "https://www.suse.com/security/cve/CVE-2025-24355/" } ], "title": "govulncheck-vulndb-0.0.20250128T150132-1.1 on GA media", "tracking": { "current_release_date": "2025-01-29T00:00:00Z", "generator": { "date": "2025-01-29T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14710-1", "initial_release_date": "2025-01-29T00:00:00Z", "revision_history": [ { "date": "2025-01-29T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "product": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "product_id": "govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "product": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "product_id": "govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "product": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "product_id": "govulncheck-vulndb-0.0.20250128T150132-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64", "product": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64", "product_id": "govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" }, "product_reference": "govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-11218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-11218" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-11218", "url": "https://www.suse.com/security/cve/CVE-2024-11218" }, { "category": "external", "summary": "SUSE Bug 1236269 for CVE-2024-11218", "url": "https://bugzilla.suse.com/1236269" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2024-11218" }, { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45339", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45339" } ], "notes": [ { "category": "general", "text": "When logs are written to a widely-writable directory (the default), an unprivileged attacker may predict a privileged process\u0027s log file path and pre-create a symbolic link to a sensitive file in its place. When that privileged process runs, it will follow the planted symlink and overwrite that sensitive file. To fix that, glog now causes the program to exit (with status code 2) when it finds that the configured log file already exists.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45339", "url": "https://www.suse.com/security/cve/CVE-2024-45339" }, { "category": "external", "summary": "SUSE Bug 1236541 for CVE-2024-45339", "url": "https://bugzilla.suse.com/1236541" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2024-45339" }, { "cve": "CVE-2024-45340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45340" } ], "notes": [ { "category": "general", "text": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45340", "url": "https://www.suse.com/security/cve/CVE-2024-45340" }, { "category": "external", "summary": "SUSE Bug 1236360 for CVE-2024-45340", "url": "https://bugzilla.suse.com/1236360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-0377", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-0377" } ], "notes": [ { "category": "general", "text": "HashiCorp\u0027s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-0377", "url": "https://www.suse.com/security/cve/CVE-2025-0377" }, { "category": "external", "summary": "SUSE Bug 1236209 for CVE-2025-0377", "url": "https://bugzilla.suse.com/1236209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2025-0377" }, { "cve": "CVE-2025-22865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22865" } ], "notes": [ { "category": "general", "text": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22865", "url": "https://www.suse.com/security/cve/CVE-2025-22865" }, { "category": "external", "summary": "SUSE Bug 1236361 for CVE-2025-22865", "url": "https://bugzilla.suse.com/1236361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2025-22865" }, { "cve": "CVE-2025-23028", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23028" } ], "notes": [ { "category": "general", "text": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. A denial of service vulnerability affects versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4. In a Kubernetes cluster where Cilium is configured to proxy DNS traffic, an attacker can crash Cilium agents by sending a crafted DNS response to workloads from outside the cluster. For traffic that is allowed but without using DNS-based policy, the dataplane will continue to pass traffic as configured at the time of the DoS. For workloads that have DNS-based policy configured, existing connections may continue to operate, and new connections made without relying on DNS resolution may continue to be established, but new connections which rely on DNS resolution may be disrupted. Any configuration changes that affect the impacted agent may not be applied until the agent is able to restart. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. No known workarounds are available.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23028", "url": "https://www.suse.com/security/cve/CVE-2025-23028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-23028" }, { "cve": "CVE-2025-23047", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23047" } ], "notes": [ { "category": "general", "text": "Cilium is a networking, observability, and security solution with an eBPF-based dataplane. An insecure default `Access-Control-Allow-Origin` header value could lead to sensitive data exposure for users of Cilium versions 1.14.0 through 1.14.7, 1.15.0 through 1.15.11, and 1.16.0 through 1.16.4 who deploy Hubble UI using either Cilium CLI or via the Cilium Helm chart. A user with access to a Hubble UI instance affected by this issue could leak configuration details about the Kubernetes cluster which Hubble UI is monitoring, including node names, IP addresses, and other metadata about workloads and the cluster networking configuration. In order for this vulnerability to be exploited, a victim would have to first visit a malicious page. This issue is fixed in Cilium v1.14.18, v1.15.12, and v1.16.5. As a workaround, users who deploy Hubble UI using the Cilium Helm chart directly can remove the CORS headers from the Helm template as shown in the patch from commit a3489f190ba6e87b5336ee685fb6c80b1270d06d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23047", "url": "https://www.suse.com/security/cve/CVE-2025-23047" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-23047" }, { "cve": "CVE-2025-23208", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-23208" } ], "notes": [ { "category": "general", "text": "zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db) is an append-list so group revocations/removals are ignored in the API. SetUserGroups is alled on login, but instead of replacing the group memberships, they are appended. This may be due to some conflict with the group definitions in the config file, but that wasn\u0027t obvious to me if it were the case. Any Zot configuration that relies on group-based authorization will not respect group remove/revocation by an IdP. This issue has been addressed in version 2.1.2. All users are advised to upgrade. There are no known workarounds for this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-23208", "url": "https://www.suse.com/security/cve/CVE-2025-23208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2025-23208" }, { "cve": "CVE-2025-24030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24030" } ], "notes": [ { "category": "general", "text": "Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24030", "url": "https://www.suse.com/security/cve/CVE-2025-24030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2025-24030" }, { "cve": "CVE-2025-24337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24337" } ], "notes": [ { "category": "general", "text": "WriteFreely through 0.15.1, when MySQL is used, allows local users to discover credentials by reading config.ini.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24337", "url": "https://www.suse.com/security/cve/CVE-2025-24337" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "important" } ], "title": "CVE-2025-24337" }, { "cve": "CVE-2025-24354", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24354" } ], "notes": [ { "category": "general", "text": "imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24354", "url": "https://www.suse.com/security/cve/CVE-2025-24354" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-24354" }, { "cve": "CVE-2025-24355", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24355" } ], "notes": [ { "category": "general", "text": "Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24355", "url": "https://www.suse.com/security/cve/CVE-2025-24355" }, { "category": "external", "summary": "SUSE Bug 1236404 for CVE-2025-24355", "url": "https://bugzilla.suse.com/1236404" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.aarch64", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.ppc64le", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.s390x", "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250128T150132-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-29T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-24355" } ] }
opensuse-su-2025:14695-1
Vulnerability from csaf_opensuse
Published
2025-01-25 00:00
Modified
2025-01-25 00:00
Summary
go1.23-1.23.5-1.1 on GA media
Notes
Title of the patch
go1.23-1.23.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.23-1.23.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14695
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.23-1.23.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.23-1.23.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14695", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14695-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14695-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRIXY47SJKPKQTDVCPRO6E2DUY5GPEEU/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14695-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRIXY47SJKPKQTDVCPRO6E2DUY5GPEEU/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" } ], "title": "go1.23-1.23.5-1.1 on GA media", "tracking": { "current_release_date": "2025-01-25T00:00:00Z", "generator": { "date": "2025-01-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14695-1", "initial_release_date": "2025-01-25T00:00:00Z", "revision_history": [ { "date": "2025-01-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-1.1.aarch64", "product": { "name": "go1.23-1.23.5-1.1.aarch64", "product_id": "go1.23-1.23.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-1.1.aarch64", "product": { "name": "go1.23-doc-1.23.5-1.1.aarch64", "product_id": "go1.23-doc-1.23.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.5-1.1.aarch64", "product": { "name": "go1.23-libstd-1.23.5-1.1.aarch64", "product_id": "go1.23-libstd-1.23.5-1.1.aarch64" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-1.1.aarch64", "product": { "name": "go1.23-race-1.23.5-1.1.aarch64", "product_id": "go1.23-race-1.23.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-1.1.ppc64le", "product": { "name": "go1.23-1.23.5-1.1.ppc64le", "product_id": "go1.23-1.23.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-1.1.ppc64le", "product": { "name": "go1.23-doc-1.23.5-1.1.ppc64le", "product_id": "go1.23-doc-1.23.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.5-1.1.ppc64le", "product": { "name": "go1.23-libstd-1.23.5-1.1.ppc64le", "product_id": "go1.23-libstd-1.23.5-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-1.1.ppc64le", "product": { "name": "go1.23-race-1.23.5-1.1.ppc64le", "product_id": "go1.23-race-1.23.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-1.1.s390x", "product": { "name": "go1.23-1.23.5-1.1.s390x", "product_id": "go1.23-1.23.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-1.1.s390x", "product": { "name": "go1.23-doc-1.23.5-1.1.s390x", "product_id": "go1.23-doc-1.23.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.5-1.1.s390x", "product": { "name": "go1.23-libstd-1.23.5-1.1.s390x", "product_id": "go1.23-libstd-1.23.5-1.1.s390x" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-1.1.s390x", "product": { "name": "go1.23-race-1.23.5-1.1.s390x", "product_id": "go1.23-race-1.23.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.23-1.23.5-1.1.x86_64", "product": { "name": "go1.23-1.23.5-1.1.x86_64", "product_id": "go1.23-1.23.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-doc-1.23.5-1.1.x86_64", "product": { "name": "go1.23-doc-1.23.5-1.1.x86_64", "product_id": "go1.23-doc-1.23.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-libstd-1.23.5-1.1.x86_64", "product": { "name": "go1.23-libstd-1.23.5-1.1.x86_64", "product_id": "go1.23-libstd-1.23.5-1.1.x86_64" } }, { "category": "product_version", "name": "go1.23-race-1.23.5-1.1.x86_64", "product": { "name": "go1.23-race-1.23.5-1.1.x86_64", "product_id": "go1.23-race-1.23.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64" }, "product_reference": "go1.23-1.23.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le" }, "product_reference": "go1.23-1.23.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x" }, "product_reference": "go1.23-1.23.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-1.23.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64" }, "product_reference": "go1.23-1.23.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64" }, "product_reference": "go1.23-doc-1.23.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le" }, "product_reference": "go1.23-doc-1.23.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x" }, "product_reference": "go1.23-doc-1.23.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-doc-1.23.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64" }, "product_reference": "go1.23-doc-1.23.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64" }, "product_reference": "go1.23-libstd-1.23.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le" }, "product_reference": "go1.23-libstd-1.23.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x" }, "product_reference": "go1.23-libstd-1.23.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-libstd-1.23.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64" }, "product_reference": "go1.23-libstd-1.23.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64" }, "product_reference": "go1.23-race-1.23.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le" }, "product_reference": "go1.23-race-1.23.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x" }, "product_reference": "go1.23-race-1.23.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.23-race-1.23.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" }, "product_reference": "go1.23-race-1.23.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.23-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-doc-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-libstd-1.23.5-1.1.x86_64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.aarch64", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.ppc64le", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.s390x", "openSUSE Tumbleweed:go1.23-race-1.23.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45341" } ] }
opensuse-su-2025:14694-1
Vulnerability from csaf_opensuse
Published
2025-01-25 00:00
Modified
2025-01-25 00:00
Summary
go1.22-1.22.11-1.1 on GA media
Notes
Title of the patch
go1.22-1.22.11-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.22-1.22.11-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14694
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.22-1.22.11-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.22-1.22.11-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14694", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14694-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14694-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3ZTZP3RXZGJRRPGSFEUWJMYPA5WPOPW/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14694-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3ZTZP3RXZGJRRPGSFEUWJMYPA5WPOPW/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" } ], "title": "go1.22-1.22.11-1.1 on GA media", "tracking": { "current_release_date": "2025-01-25T00:00:00Z", "generator": { "date": "2025-01-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14694-1", "initial_release_date": "2025-01-25T00:00:00Z", "revision_history": [ { "date": "2025-01-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-1.1.aarch64", "product": { "name": "go1.22-1.22.11-1.1.aarch64", "product_id": "go1.22-1.22.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-1.1.aarch64", "product": { "name": "go1.22-doc-1.22.11-1.1.aarch64", "product_id": "go1.22-doc-1.22.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.22-libstd-1.22.11-1.1.aarch64", "product": { "name": "go1.22-libstd-1.22.11-1.1.aarch64", "product_id": "go1.22-libstd-1.22.11-1.1.aarch64" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-1.1.aarch64", "product": { "name": "go1.22-race-1.22.11-1.1.aarch64", "product_id": "go1.22-race-1.22.11-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-1.1.ppc64le", "product": { "name": "go1.22-1.22.11-1.1.ppc64le", "product_id": "go1.22-1.22.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-1.1.ppc64le", "product": { "name": "go1.22-doc-1.22.11-1.1.ppc64le", "product_id": "go1.22-doc-1.22.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-libstd-1.22.11-1.1.ppc64le", "product": { "name": "go1.22-libstd-1.22.11-1.1.ppc64le", "product_id": "go1.22-libstd-1.22.11-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-1.1.ppc64le", "product": { "name": "go1.22-race-1.22.11-1.1.ppc64le", "product_id": "go1.22-race-1.22.11-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-1.1.s390x", "product": { "name": "go1.22-1.22.11-1.1.s390x", "product_id": "go1.22-1.22.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-1.1.s390x", "product": { "name": "go1.22-doc-1.22.11-1.1.s390x", "product_id": "go1.22-doc-1.22.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.22-libstd-1.22.11-1.1.s390x", "product": { "name": "go1.22-libstd-1.22.11-1.1.s390x", "product_id": "go1.22-libstd-1.22.11-1.1.s390x" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-1.1.s390x", "product": { "name": "go1.22-race-1.22.11-1.1.s390x", "product_id": "go1.22-race-1.22.11-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.22-1.22.11-1.1.x86_64", "product": { "name": "go1.22-1.22.11-1.1.x86_64", "product_id": "go1.22-1.22.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.22-doc-1.22.11-1.1.x86_64", "product": { "name": "go1.22-doc-1.22.11-1.1.x86_64", "product_id": "go1.22-doc-1.22.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.22-libstd-1.22.11-1.1.x86_64", "product": { "name": "go1.22-libstd-1.22.11-1.1.x86_64", "product_id": "go1.22-libstd-1.22.11-1.1.x86_64" } }, { "category": "product_version", "name": "go1.22-race-1.22.11-1.1.x86_64", "product": { "name": "go1.22-race-1.22.11-1.1.x86_64", "product_id": "go1.22-race-1.22.11-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64" }, "product_reference": "go1.22-1.22.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le" }, "product_reference": "go1.22-1.22.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x" }, "product_reference": "go1.22-1.22.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-1.22.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64" }, "product_reference": "go1.22-1.22.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64" }, "product_reference": "go1.22-doc-1.22.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le" }, "product_reference": "go1.22-doc-1.22.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x" }, "product_reference": "go1.22-doc-1.22.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-doc-1.22.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64" }, "product_reference": "go1.22-doc-1.22.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-libstd-1.22.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64" }, "product_reference": "go1.22-libstd-1.22.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-libstd-1.22.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le" }, "product_reference": "go1.22-libstd-1.22.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-libstd-1.22.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x" }, "product_reference": "go1.22-libstd-1.22.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-libstd-1.22.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64" }, "product_reference": "go1.22-libstd-1.22.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64" }, "product_reference": "go1.22-race-1.22.11-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le" }, "product_reference": "go1.22-race-1.22.11-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x" }, "product_reference": "go1.22-race-1.22.11-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.22-race-1.22.11-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" }, "product_reference": "go1.22-race-1.22.11-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.22-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-doc-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-libstd-1.22.11-1.1.x86_64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.aarch64", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.ppc64le", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.s390x", "openSUSE Tumbleweed:go1.22-race-1.22.11-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-25T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45341" } ] }
opensuse-su-2025:14693-1
Vulnerability from csaf_opensuse
Published
2025-01-24 00:00
Modified
2025-01-24 00:00
Summary
go1.24-1.24rc2-1.1 on GA media
Notes
Title of the patch
go1.24-1.24rc2-1.1 on GA media
Description of the patch
These are all security issues fixed in the go1.24-1.24rc2-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-14693
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "go1.24-1.24rc2-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the go1.24-1.24rc2-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-14693", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14693-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2025:14693-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZW52JECN55QJ6BSQ4PZXG4RAAPBRCVGB/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2025:14693-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZW52JECN55QJ6BSQ4PZXG4RAAPBRCVGB/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45336 page", "url": "https://www.suse.com/security/cve/CVE-2024-45336/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45340 page", "url": "https://www.suse.com/security/cve/CVE-2024-45340/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-45341 page", "url": "https://www.suse.com/security/cve/CVE-2024-45341/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-22865 page", "url": "https://www.suse.com/security/cve/CVE-2025-22865/" } ], "title": "go1.24-1.24rc2-1.1 on GA media", "tracking": { "current_release_date": "2025-01-24T00:00:00Z", "generator": { "date": "2025-01-24T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:14693-1", "initial_release_date": "2025-01-24T00:00:00Z", "revision_history": [ { "date": "2025-01-24T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-1.1.aarch64", "product": { "name": "go1.24-1.24rc2-1.1.aarch64", "product_id": "go1.24-1.24rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-1.1.aarch64", "product": { "name": "go1.24-doc-1.24rc2-1.1.aarch64", "product_id": "go1.24-doc-1.24rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24rc2-1.1.aarch64", "product": { "name": "go1.24-libstd-1.24rc2-1.1.aarch64", "product_id": "go1.24-libstd-1.24rc2-1.1.aarch64" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-1.1.aarch64", "product": { "name": "go1.24-race-1.24rc2-1.1.aarch64", "product_id": "go1.24-race-1.24rc2-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-1.1.ppc64le", "product": { "name": "go1.24-1.24rc2-1.1.ppc64le", "product_id": "go1.24-1.24rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-1.1.ppc64le", "product": { "name": "go1.24-doc-1.24rc2-1.1.ppc64le", "product_id": "go1.24-doc-1.24rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-libstd-1.24rc2-1.1.ppc64le", "product": { "name": "go1.24-libstd-1.24rc2-1.1.ppc64le", "product_id": "go1.24-libstd-1.24rc2-1.1.ppc64le" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-1.1.ppc64le", "product": { "name": "go1.24-race-1.24rc2-1.1.ppc64le", "product_id": "go1.24-race-1.24rc2-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-1.1.s390x", "product": { "name": "go1.24-1.24rc2-1.1.s390x", "product_id": "go1.24-1.24rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-1.1.s390x", "product": { "name": "go1.24-doc-1.24rc2-1.1.s390x", "product_id": "go1.24-doc-1.24rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-libstd-1.24rc2-1.1.s390x", "product": { "name": "go1.24-libstd-1.24rc2-1.1.s390x", "product_id": "go1.24-libstd-1.24rc2-1.1.s390x" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-1.1.s390x", "product": { "name": "go1.24-race-1.24rc2-1.1.s390x", "product_id": "go1.24-race-1.24rc2-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go1.24-1.24rc2-1.1.x86_64", "product": { "name": "go1.24-1.24rc2-1.1.x86_64", "product_id": "go1.24-1.24rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-doc-1.24rc2-1.1.x86_64", "product": { "name": "go1.24-doc-1.24rc2-1.1.x86_64", "product_id": "go1.24-doc-1.24rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-libstd-1.24rc2-1.1.x86_64", "product": { "name": "go1.24-libstd-1.24rc2-1.1.x86_64", "product_id": "go1.24-libstd-1.24rc2-1.1.x86_64" } }, { "category": "product_version", "name": "go1.24-race-1.24rc2-1.1.x86_64", "product": { "name": "go1.24-race-1.24rc2-1.1.x86_64", "product_id": "go1.24-race-1.24rc2-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64" }, "product_reference": "go1.24-1.24rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le" }, "product_reference": "go1.24-1.24rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x" }, "product_reference": "go1.24-1.24rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-1.24rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64" }, "product_reference": "go1.24-1.24rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64" }, "product_reference": "go1.24-doc-1.24rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le" }, "product_reference": "go1.24-doc-1.24rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x" }, "product_reference": "go1.24-doc-1.24rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-doc-1.24rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64" }, "product_reference": "go1.24-doc-1.24rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64" }, "product_reference": "go1.24-libstd-1.24rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le" }, "product_reference": "go1.24-libstd-1.24rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x" }, "product_reference": "go1.24-libstd-1.24rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-libstd-1.24rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64" }, "product_reference": "go1.24-libstd-1.24rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64" }, "product_reference": "go1.24-race-1.24rc2-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le" }, "product_reference": "go1.24-race-1.24rc2-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x" }, "product_reference": "go1.24-race-1.24rc2-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "go1.24-race-1.24rc2-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" }, "product_reference": "go1.24-race-1.24rc2-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45336" } ], "notes": [ { "category": "general", "text": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45336", "url": "https://www.suse.com/security/cve/CVE-2024-45336" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236045" }, { "category": "external", "summary": "SUSE Bug 1236046 for CVE-2024-45336", "url": "https://bugzilla.suse.com/1236046" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45340", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45340" } ], "notes": [ { "category": "general", "text": "Credentials provided via the new GOAUTH feature were not being properly segmented by domain, allowing a malicious server to request credentials they should not have access to. By default, unless otherwise set, this only affected credentials stored in the users .netrc file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45340", "url": "https://www.suse.com/security/cve/CVE-2024-45340" }, { "category": "external", "summary": "SUSE Bug 1236360 for CVE-2024-45340", "url": "https://bugzilla.suse.com/1236360" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T00:00:00Z", "details": "important" } ], "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-45341" } ], "notes": [ { "category": "general", "text": "A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-45341", "url": "https://www.suse.com/security/cve/CVE-2024-45341" }, { "category": "external", "summary": "SUSE Bug 1236045 for CVE-2024-45341", "url": "https://bugzilla.suse.com/1236045" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T00:00:00Z", "details": "moderate" } ], "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22865", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-22865" } ], "notes": [ { "category": "general", "text": "Using ParsePKCS1PrivateKey to parse a RSA key that is missing the CRT values would panic when verifying that the key is well formed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-22865", "url": "https://www.suse.com/security/cve/CVE-2025-22865" }, { "category": "external", "summary": "SUSE Bug 1236361 for CVE-2025-22865", "url": "https://bugzilla.suse.com/1236361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-doc-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-libstd-1.24rc2-1.1.x86_64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.aarch64", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.ppc64le", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.s390x", "openSUSE Tumbleweed:go1.24-race-1.24rc2-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-01-24T00:00:00Z", "details": "important" } ], "title": "CVE-2025-22865" } ] }
wid-sec-w-2025-0111
Vulnerability from csaf_certbund
Published
2025-01-16 23:00
Modified
2025-06-29 22:00
Summary
Golang Go: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Go ist eine quelloffene Programmiersprache.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuführen, Sicherheitsmaßnahmen zu umgehen und vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Go ist eine quelloffene Programmiersprache.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Golang Go ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen und vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0111 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0111.json" }, { "category": "self", "summary": "WID-SEC-2025-0111 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0111" }, { "category": "external", "summary": "Golang Announce vom 2025-01-16", "url": "https://groups.google.com/g/golang-announce/c/L8jWYHEfOlQ" }, { "category": "external", "summary": "Golang Announce vom 2025-01-16", "url": "https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI" }, { "category": "external", "summary": "Go Issue vom 2025-01-16", "url": "https://go.dev/issue/71156" }, { "category": "external", "summary": "Go Issue vom 2025-01-16", "url": "https://go.dev/issue/70530" }, { "category": "external", "summary": "Go Issue vom 2025-01-16", "url": "https://go.dev/issue/71249" }, { "category": "external", "summary": "Go Issue vom 2025-01-16", "url": "https://go.dev/issue/71216" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14694-1 vom 2025-01-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3ZTZP3RXZGJRRPGSFEUWJMYPA5WPOPW/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14695-1 vom 2025-01-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRIXY47SJKPKQTDVCPRO6E2DUY5GPEEU/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14693-1 vom 2025-01-25", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZW52JECN55QJ6BSQ4PZXG4RAAPBRCVGB/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0280-1 vom 2025-01-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RQNJ3CKJG63VZGTT4HRQJYBPGOWBUF5C/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0285-1 vom 2025-01-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TEFUHGEYXH2V4IV65LVVWOSXPYD2UOCT/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3131 vom 2025-03-26", "url": "https://access.redhat.com/errata/RHSA-2025:3131" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3335 vom 2025-03-27", "url": "https://access.redhat.com/errata/RHSA-2025:3335" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3593 vom 2025-04-03", "url": "https://access.redhat.com/errata/RHSA-2025:3593" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3772 vom 2025-04-10", "url": "https://access.redhat.com/errata/RHSA-2025:3772" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3772 vom 2025-04-10", "url": "https://linux.oracle.com/errata/ELSA-2025-3772.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3922 vom 2025-04-15", "url": "https://access.redhat.com/errata/RHSA-2025:3922" }, { "category": "external", "summary": "IBM Security Bulletin 7232437 vom 2025-05-03", "url": "https://www.ibm.com/support/pages/node/7232437" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4666 vom 2025-05-07", "url": "https://access.redhat.com/errata/RHSA-2025:4666" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4667 vom 2025-05-07", "url": "https://access.redhat.com/errata/RHSA-2025:4667" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4810 vom 2025-05-12", "url": "https://access.redhat.com/errata/RHSA-2025:4810" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7326 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:7326" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7466 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:7466" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7624 vom 2025-05-14", "url": "https://access.redhat.com/errata/RHSA-2025:7624" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:01731-1 vom 2025-05-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-May/020921.html" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7574-1 vom 2025-06-19", "url": "https://ubuntu.com/security/notices/USN-7574-1" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:9514 vom 2025-06-24", "url": "https://access.redhat.com/errata/RHSA-2025:9514" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7466 vom 2025-06-28", "url": "https://linux.oracle.com/errata/ELSA-2025-7466.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7592 vom 2025-06-28", "url": "https://linux.oracle.com/errata/ELSA-2025-7592.html" } ], "source_lang": "en-US", "title": "Golang Go: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-29T22:00:00.000+00:00", "generator": { "date": "2025-06-30T09:17:43.657+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0111", "initial_release_date": "2025-01-16T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-01-28T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-29T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-03T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-04T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-07T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-14T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-06-19T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-06-24T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-29T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "20" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c1.24rc2", "product": { "name": "Golang Go \u003c1.24rc2", "product_id": "T040382" } }, { "category": "product_version", "name": "1.24rc2", "product": { "name": "Golang Go 1.24rc2", "product_id": "T040382-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.24rc2" } } }, { "category": "product_version_range", "name": "\u003c1.24", "product": { "name": "Golang Go \u003c1.24", "product_id": "T040383" } }, { "category": "product_version", "name": "1.24", "product": { "name": "Golang Go 1.24", "product_id": "T040383-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.24" } } }, { "category": "product_version_range", "name": "\u003c1.23.5", "product": { "name": "Golang Go \u003c1.23.5", "product_id": "T040384" } }, { "category": "product_version", "name": "1.23.5", "product": { "name": "Golang Go 1.23.5", "product_id": "T040384-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.23.5" } } }, { "category": "product_version_range", "name": "\u003c1.22.11", "product": { "name": "Golang Go \u003c1.22.11", "product_id": "T040385" } }, { "category": "product_version", "name": "1.22.11", "product": { "name": "Golang Go 1.22.11", "product_id": "T040385-fixed", "product_identification_helper": { "cpe": "cpe:/a:golang:go:1.22.11" } } } ], "category": "product_name", "name": "Go" } ], "category": "vendor", "name": "Golang" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c24.0.1-IF002", "product": { "name": "IBM Business Automation Workflow \u003c24.0.1-IF002", "product_id": "T043290" } }, { "category": "product_version", "name": "24.0.1-IF002", "product": { "name": "IBM Business Automation Workflow 24.0.1-IF002", "product_id": "T043290-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.1-if002" } } }, { "category": "product_version_range", "name": "\u003c24.0.0-IF005", "product": { "name": "IBM Business Automation Workflow \u003c24.0.0-IF005", "product_id": "T043291" } }, { "category": "product_version", "name": "24.0.0-IF005", "product": { "name": "IBM Business Automation Workflow 24.0.0-IF005", "product_id": "T043291-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:24.0.0-if005" } } } ], "category": "product_name", "name": "Business Automation Workflow" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-45336", "product_status": { "known_affected": [ "T040384", "T040383", "T040382", "T002207", "67646", "T000126", "T043290", "T043291", "T027843", "T002977", "T004914", "T040385" ] }, "release_date": "2025-01-16T23:00:00.000+00:00", "title": "CVE-2024-45336" }, { "cve": "CVE-2024-45340", "product_status": { "known_affected": [ "T040384", "T040383", "T040382", "T002207", "67646", "T000126", "T043290", "T043291", "T027843", "T002977", "T004914", "T040385" ] }, "release_date": "2025-01-16T23:00:00.000+00:00", "title": "CVE-2024-45340" }, { "cve": "CVE-2024-45341", "product_status": { "known_affected": [ "T040384", "T040383", "T040382", "T002207", "67646", "T000126", "T043290", "T043291", "T027843", "T002977", "T004914", "T040385" ] }, "release_date": "2025-01-16T23:00:00.000+00:00", "title": "CVE-2024-45341" }, { "cve": "CVE-2025-22865", "product_status": { "known_affected": [ "T040384", "T040383", "T040382", "T002207", "67646", "T000126", "T043290", "T043291", "T027843", "T002977", "T004914", "T040385" ] }, "release_date": "2025-01-16T23:00:00.000+00:00", "title": "CVE-2025-22865" } ] }
ghsa-7wrw-r4p8-38rx
Vulnerability from github
Published
2025-01-28 03:31
Modified
2025-02-21 18:31
Severity ?
VLAI Severity ?
Details
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
{ "affected": [], "aliases": [ "CVE-2024-45336" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-01-28T02:15:28Z", "severity": "MODERATE" }, "details": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.", "id": "GHSA-7wrw-r4p8-38rx", "modified": "2025-02-21T18:31:06Z", "published": "2025-01-28T03:31:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45336" }, { "type": "WEB", "url": "https://go.dev/cl/643100" }, { "type": "WEB", "url": "https://go.dev/issue/70530" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2025-3420" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250221-0003" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2024-45336
Vulnerability from fkie_nvd
Published
2025-01-28 02:15
Modified
2025-02-21 18:15
Severity ?
Summary
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
References
▶ | URL | Tags | |
---|---|---|---|
security@golang.org | https://go.dev/cl/643100 | ||
security@golang.org | https://go.dev/issue/70530 | ||
security@golang.org | https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ | ||
security@golang.org | https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ | ||
security@golang.org | https://pkg.go.dev/vuln/GO-2025-3420 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250221-0003/ |
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2." }, { "lang": "es", "value": "El cliente HTTP descarta los encabezados confidenciales despu\u00e9s de seguir una redirecci\u00f3n entre dominios. Por ejemplo, una solicitud a a.com/ que contiene un encabezado de autorizaci\u00f3n que se redirige a b.com/ no enviar\u00e1 ese encabezado a b.com. Sin embargo, en el caso de que el cliente reciba una redirecci\u00f3n posterior al mismo dominio, los encabezados confidenciales se restaurar\u00e1n. Por ejemplo, una cadena de redirecciones desde a.com/, a b.com/1 y, finalmente, a b.com/2 enviar\u00eda incorrectamente el encabezado de autorizaci\u00f3n a b.com/2." } ], "id": "CVE-2024-45336", "lastModified": "2025-02-21T18:15:17.400", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-01-28T02:15:28.807", "references": [ { "source": "security@golang.org", "url": "https://go.dev/cl/643100" }, { "source": "security@golang.org", "url": "https://go.dev/issue/70530" }, { "source": "security@golang.org", "url": "https://groups.google.com/g/golang-dev/c/CAWXhan3Jww/m/bk9LAa-lCgAJ" }, { "source": "security@golang.org", "url": "https://groups.google.com/g/golang-dev/c/bG8cv1muIBM/m/G461hA6lCgAJ" }, { "source": "security@golang.org", "url": "https://pkg.go.dev/vuln/GO-2025-3420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20250221-0003/" } ], "sourceIdentifier": "security@golang.org", "vulnStatus": "Awaiting Analysis" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…