decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS. https://github.com/SamVerschueren/decode-uri-component/issues/5
Created cockatrice tracking bugs for this issue: Affects: fedora-36 [bug 2170652] Created golang-entgo-ent tracking bugs for this issue: Affects: fedora-36 [bug 2170653] Created golang-github-prometheus tracking bugs for this issue: Affects: epel-7 [bug 2170649] Created grafana tracking bugs for this issue: Affects: fedora-36 [bug 2170654] Created mozjs68 tracking bugs for this issue: Affects: fedora-36 [bug 2170655] Created mozjs78 tracking bugs for this issue: Affects: fedora-36 [bug 2170656] Created nodejs:13/nodejs tracking bugs for this issue: Affects: epel-8 [bug 2170650] Created nodejs:14/nodejs tracking bugs for this issue: Affects: fedora-36 [bug 2170657] Created pcs tracking bugs for this issue: Affects: fedora-all [bug 2170648] Created yarnpkg tracking bugs for this issue: Affects: epel-8 [bug 2170651] Created zuul tracking bugs for this issue: Affects: fedora-36 [bug 2170658]
*** Bug 2149084 has been marked as a duplicate of this bug. ***
Created yarnpkg tracking bugs for this issue: Affects: fedora-all [bug 2174577]
This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.7 Via RHSA-2023:1428 https://access.redhat.com/errata/RHSA-2023:1428
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:1533 https://access.redhat.com/errata/RHSA-2023:1533
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1742 https://access.redhat.com/errata/RHSA-2023:1742
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1743 https://access.redhat.com/errata/RHSA-2023:1743
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:1744 https://access.redhat.com/errata/RHSA-2023:1744
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-38900
This issue has been addressed in the following products: RHODF-4.13-RHEL-9 Via RHSA-2023:3742 https://access.redhat.com/errata/RHSA-2023:3742
Created yarnpkg tracking bugs for this issue: Affects: epel-8 [bug 2222350]
This issue has been addressed in the following products: RHPAM 7.13.4 async Via RHSA-2023:4983 https://access.redhat.com/errata/RHSA-2023:4983
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:6316 https://access.redhat.com/errata/RHSA-2023:6316