rhsa-2025:12359
Vulnerability from csaf_redhat
Published
2025-07-31 10:50
Modified
2025-08-12 09:12
Summary
Red Hat Security Advisory: Red Hat OpenShift sandboxed containers release

Notes

Topic
Release of Red Hat OpenShift sandboxed containers.
Details
Red Hat OpenShift sandboxed containers, based on the Kata Containers project.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Release of Red Hat OpenShift sandboxed containers.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat OpenShift sandboxed containers, based on the Kata Containers project.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12359",
        "url": "https://access.redhat.com/errata/RHSA-2025:12359"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-22871",
        "url": "https://access.redhat.com/security/cve/CVE-2025-22871"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/cve/CVE-2025-5791",
        "url": "https://access.redhat.com/security/cve/CVE-2025-5791"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/",
        "url": "https://access.redhat.com/security/updates/classification/"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12359.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat OpenShift sandboxed containers release",
    "tracking": {
      "current_release_date": "2025-08-12T09:12:36+00:00",
      "generator": {
        "date": "2025-08-12T09:12:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.6"
        }
      },
      "id": "RHSA-2025:12359",
      "initial_release_date": "2025-07-31T10:50:08+00:00",
      "revision_history": [
        {
          "date": "2025-07-31T10:50:08+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-07-31T10:50:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-08-12T09:12:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift sandboxed containers 1.1",
                "product": {
                  "name": "Red Hat OpenShift sandboxed containers 1.1",
                  "product_id": "Red Hat OpenShift sandboxed containers 1.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:confidential_compute_attestation:1.10::el9"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat OpenShift sandboxed containers"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-cloud-api-adaptor-rhel9@sha256%3A145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752227514"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-cloud-api-adaptor-webhook-rhel9@sha256%3A2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752227478"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-dm-verity-image@sha256%3A0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753867639"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-monitor-rhel9@sha256%3Afe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752234172"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-must-gather-rhel9@sha256%3Acf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753276739"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-rhel9-operator@sha256%3Aa6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753885668"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-operator-bundle@sha256%3A889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753889819"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-podvm-builder-rhel9@sha256%3A90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753277135"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-podvm-payload-rhel9@sha256%3A07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb?arch=amd64\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752228093"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-cloud-api-adaptor-rhel9@sha256%3A553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752227514"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-cloud-api-adaptor-webhook-rhel9@sha256%3A80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752227478"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-monitor-rhel9@sha256%3A0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752234172"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-must-gather-rhel9@sha256%3A26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753276739"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-rhel9-operator@sha256%3Adefd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753885668"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-podvm-builder-rhel9@sha256%3A148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1753277135"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
                "product": {
                  "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
                  "product_id": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
                  "product_identification_helper": {
                    "purl": "pkg:oci/osc-podvm-payload-rhel9@sha256%3A7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-sandboxed-containers\u0026tag=1.10-1752228093"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64 as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x as a component of Red Hat OpenShift sandboxed containers 1.1",
          "product_id": "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
        },
        "product_reference": "registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x",
        "relates_to_product_reference": "Red Hat OpenShift sandboxed containers 1.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-5791",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "discovery_date": "2025-06-03T13:02:24.781295+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2370001"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "users: `root` appended to group listings",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This vulnerability is rated as an important severity because a flaw in the users crate for Rust allows local privilege escalation. Specifically, when a user or process belongs to fewer than exactly 1024 groups, the crate\u2019s group listing logic incorrectly includes the root group in the access list. This erroneous behavior enables unauthorized processes or users to gain elevated privileges, compromising system confidentiality and integrity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
        ],
        "known_not_affected": [
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-5791"
        },
        {
          "category": "external",
          "summary": "RHBZ#2370001",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370001"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-5791",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-5791"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5791",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5791"
        },
        {
          "category": "external",
          "summary": "https://crates.io/crates/users",
          "url": "https://crates.io/crates/users"
        },
        {
          "category": "external",
          "summary": "https://github.com/ogham/rust-users/issues/44",
          "url": "https://github.com/ogham/rust-users/issues/44"
        },
        {
          "category": "external",
          "summary": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html",
          "url": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html"
        }
      ],
      "release_date": "2025-01-15T12:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-31T10:50:08+00:00",
          "details": "A new release of Red Hat OpenShift sandboxed containers.",
          "product_ids": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12359"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "users: `root` appended to group listings"
    },
    {
      "cve": "CVE-2025-22871",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2025-04-08T21:01:32.229479+00:00",
      "flags": [
        {
          "label": "vulnerable_code_not_present",
          "product_ids": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x"
          ]
        }
      ],
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2358493"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling\u2014where an attacker tricks the system to send hidden or unauthorized requests.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Satellite includes affected component however product is not directly impacted since the vulnerability arises when \"net/http\" is used as a server. Satellite uses it solely as a client, so it\u0027s not exposed to the flaw. Product Security has assessed this as Low severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
        ],
        "known_not_affected": [
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
          "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-22871"
        },
        {
          "category": "external",
          "summary": "RHBZ#2358493",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358493"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-22871",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871"
        },
        {
          "category": "external",
          "summary": "https://go.dev/cl/652998",
          "url": "https://go.dev/cl/652998"
        },
        {
          "category": "external",
          "summary": "https://go.dev/issue/71988",
          "url": "https://go.dev/issue/71988"
        },
        {
          "category": "external",
          "summary": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk",
          "url": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk"
        },
        {
          "category": "external",
          "summary": "https://pkg.go.dev/vuln/GO-2025-3563",
          "url": "https://pkg.go.dev/vuln/GO-2025-3563"
        }
      ],
      "release_date": "2025-04-08T20:04:34.769000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-31T10:50:08+00:00",
          "details": "A new release of Red Hat OpenShift sandboxed containers.",
          "product_ids": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12359"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:145a851ce5b328570edbb67840af93b2ac74b64d61ab53edb4c2b7a032bfc0d8_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-rhel9@sha256:553f4675d67f026e6ec93878232ff318c5afde3e11aaff4b242a3d8b4fbbf9a3_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:2a3b19f5b30d86ec642893a624fca497947b6f020b23b980c193dc6f1e8bfe86_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-cloud-api-adaptor-webhook-rhel9@sha256:80072b2e31b7d66d9db7c2771fe948adb9a691c41bb6e85ce9340a14868fcc3d_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-dm-verity-image@sha256:0ca1f56909a56dbe69a18b00d68bec1611194af4663a95190993e1979afd6d0f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:0c74e8040cbaaadc98d6f8f5d6ba3ba7a7a64efb17b900e7236ae5971c1468ba_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-monitor-rhel9@sha256:fe1adfde4668adc301611434ae9391a87cfc220f5cb8d4649d8238f9e885f78f_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:26f96e210c74d7450b8452f1550b37a52eed90b39091153289c0a7a5b9560e40_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-must-gather-rhel9@sha256:cf365561379b600c23ffad02d3ac34ebb439f42edbf548b137b103d58d2d2768_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-operator-bundle@sha256:889eb87711bf7d44d1a851da9c6ab4e519778f2b91400e15038573261456ff38_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:148247603e736c15d7273682daf7fa77932a877351aad4393ad2936004342c14_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-builder-rhel9@sha256:90a5fed893ebe8fda97f73b7042477c9a668629a5793bc5052e1fa0573283e7c_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:07f395b10c3ffb142db2142648eb0a418a22c2b6b1731826b999fc161df6fdbb_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-podvm-payload-rhel9@sha256:7452e5c4a177f1421a096f476572820c79f7b45442e11a2fe6dce39e497927c7_s390x",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba_amd64",
            "Red Hat OpenShift sandboxed containers 1.1:registry.redhat.io/openshift-sandboxed-containers/osc-rhel9-operator@sha256:defd993caf39258bfa91b92c800b6ea907765da8ff826c451e73695367766329_s390x"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…