{"id":"RHSA-2022:0291","summary":"Red Hat Security Advisory: parfait:0.5 security update","modified":"2026-03-19T10:04:43Z","published":"2024-10-20T18:35:09Z","upstream":["CVE-2021-4104","CVE-2022-23302","CVE-2022-23305","CVE-2022-23307"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:0291"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/security/vulnerabilities/RHSB-2021-009"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031667"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041959"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041967"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0291.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-4104"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-4104"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4104"},{"type":"ARTICLE","url":"https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"},{"type":"ARTICLE","url":"https://github.com/apache/logging-log4j2/pull/608#issuecomment-991723301"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/0x4zvtq92yggdgvwfgsftqrj4xx5w0nx"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2021/12/13/1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23302"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23302"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23302"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/18/3"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23305"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/18/4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23307"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23307"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23307"},{"type":"ARTICLE","url":"https://www.openwall.com/lists/oss-security/2022/01/18/5"}],"affected":[{"package":{"name":"parfait","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/parfait"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.4-4.module+el8.2.0+13999+fa2fb353"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"parfait-examples","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/parfait-examples"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.4-4.module+el8.2.0+13999+fa2fb353"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"parfait-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/parfait-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.4-4.module+el8.2.0+13999+fa2fb353"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"pcp-parfait-agent","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/pcp-parfait-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.4-4.module+el8.2.0+13999+fa2fb353"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"si-units","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/si-units"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.6.5-2.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"si-units-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/si-units-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.6.5-2.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"unit-api","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/unit-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0-5.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"unit-api-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/unit-api-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0-5.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-lib","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-lib"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-6.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-lib-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-lib-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-6.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-parent","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-parent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.3-3.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-se","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-se"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.4-3.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-se-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-se-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.4-3.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-systems","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-systems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.7-1.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}},{"package":{"name":"uom-systems-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/uom-systems-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.7-1.module+el8+2463+615f6896"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0291.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}