Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-2100 (GCVE-0-2026-2100)
Vulnerability from cvelistv5 – Published: 2026-03-26 20:01 – Updated: 2026-05-19 09:06- CWE-824 - Access of Uninitialized Pointer
| URL | Tags |
|---|---|
| https://access.redhat.com/errata/RHSA-2026:18143 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2026:7065 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2026-2100 | vdb-entryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2437308 | issue-trackingx_refsource_REDHAT |
| https://github.com/p11-glue/p11-kit/pull/740 |
| Vendor | Product | Version | |
|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected:
0:0.26.2-1.el10 , < *
(rpm)
cpe:/o:redhat:enterprise_linux:10.2 |
|
| Red Hat | Red Hat Hardened Images |
Unaffected:
0.26.2-1.1.hum1 , < *
(rpm)
cpe:/a:redhat:hummingbird:1 |
|
| Red Hat | Red Hat Enterprise Linux 6 |
cpe:/o:redhat:enterprise_linux:6 |
|
| Red Hat | Red Hat Enterprise Linux 7 |
cpe:/o:redhat:enterprise_linux:7 |
|
| Red Hat | Red Hat Enterprise Linux 8 |
cpe:/o:redhat:enterprise_linux:8 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
|
| Red Hat | Red Hat OpenShift Container Platform 4 |
cpe:/a:redhat:openshift:4 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-2100",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-26T20:30:34.453809Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-26T20:30:53.390Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.2"
],
"defaultStatus": "affected",
"packageName": "p11-kit",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:0.26.2-1.el10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:hummingbird:1"
],
"defaultStatus": "affected",
"packageName": "p11-kit-main",
"product": "Red Hat Hardened Images",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0.26.2-1.1.hum1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unaffected",
"packageName": "p11-kit",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unaffected",
"packageName": "p11-kit",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "unaffected",
"packageName": "p11-kit",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "affected",
"packageName": "p11-kit",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
}
],
"credits": [
{
"lang": "en",
"value": "This issue was discovered by Zoltan Fridrich (Red Hat)."
}
],
"datePublic": "2026-02-06T08:08:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-824",
"description": "Access of Uninitialized Pointer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-19T09:06:54.871Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:18143",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:18143"
},
{
"name": "RHSA-2026:7065",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"name": "RHBZ#2437308",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
},
{
"url": "https://github.com/p11-glue/p11-kit/pull/740"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-02-06T12:02:49.002Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-02-06T08:08:00.000Z",
"value": "Made public."
}
],
"title": "P11-kit: null dereference via c_derivekey with specific null parameters",
"workarounds": [
{
"lang": "en",
"value": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-824: Access of Uninitialized Pointer"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2026-2100",
"datePublished": "2026-03-26T20:01:46.174Z",
"dateReserved": "2026-02-06T12:05:50.501Z",
"dateUpdated": "2026-05-19T09:06:54.871Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-2100",
"date": "2026-05-18",
"epss": "0.00054",
"percentile": "0.16773"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-2100\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-03-26T21:17:04.247\",\"lastModified\":\"2026-05-19T10:16:22.840\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en p11-kit. Un atacante remoto podr\u00eda explotar esta vulnerabilidad al llamar a la funci\u00f3n C_DeriveKey en un token remoto con par\u00e1metros espec\u00edficos del mecanismo de derivaci\u00f3n IBM kyber o IBM btc establecidos en NULL. Esto podr\u00eda llevar al cliente RPC intentando devolver un valor no inicializado, resultando potencialmente en una desreferencia NULL o comportamiento indefinido. Este problema puede causar una denegaci\u00f3n de servicio a nivel de aplicaci\u00f3n o a otros estados impredecibles del sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-824\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:p11-kit_project:p11-kit:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC8CB498-F5D5-4AB6-B33E-404C80966280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87DEB507-5B64-47D7-9A50-3B87FD1E571F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:18143\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:7065\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2026-2100\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2437308\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/p11-glue/p11-kit/pull/740\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-2100\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-26T20:30:34.453809Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-26T20:30:48.552Z\"}}], \"cna\": {\"title\": \"P11-kit: null dereference via c_derivekey with specific null parameters\", \"credits\": [{\"lang\": \"en\", \"value\": \"This issue was discovered by Zoltan Fridrich (Red Hat).\"}], \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Moderate\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.2\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:0.26.2-1.el10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"p11-kit\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:hummingbird:1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Hardened Images\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0.26.2-1.1.hum1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"p11-kit-main\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"p11-kit\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"packageName\": \"p11-kit\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"packageName\": \"p11-kit\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"p11-kit\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-02-06T12:02:49.002Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-02-06T08:08:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-02-06T08:08:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:18143\", \"name\": \"RHSA-2026:18143\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:7065\", \"name\": \"RHSA-2026:7065\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2026-2100\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2437308\", \"name\": \"RHBZ#2437308\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://github.com/p11-glue/p11-kit/pull/740\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-824\", \"description\": \"Access of Uninitialized Pointer\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-05-19T09:06:54.871Z\"}, \"x_redhatCweChain\": \"CWE-824: Access of Uninitialized Pointer\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-2100\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-19T09:06:54.871Z\", \"dateReserved\": \"2026-02-06T12:05:50.501Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-03-26T20:01:46.174Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2026-2100
Vulnerability from fkie_nvd - Published: 2026-03-26 21:17 - Updated: 2026-05-19 10:167.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| p11-kit_project | p11-kit | - | |
| redhat | hardened_images | - | |
| redhat | enterprise_linux | 9.0 | |
| redhat | enterprise_linux | 10.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:p11-kit_project:p11-kit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC8CB498-F5D5-4AB6-B33E-404C80966280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:hardened_images:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87DEB507-5B64-47D7-9A50-3B87FD1E571F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D65C2163-CFC2-4ABB-8F4E-CB09CEBD006C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en p11-kit. Un atacante remoto podr\u00eda explotar esta vulnerabilidad al llamar a la funci\u00f3n C_DeriveKey en un token remoto con par\u00e1metros espec\u00edficos del mecanismo de derivaci\u00f3n IBM kyber o IBM btc establecidos en NULL. Esto podr\u00eda llevar al cliente RPC intentando devolver un valor no inicializado, resultando potencialmente en una desreferencia NULL o comportamiento indefinido. Este problema puede causar una denegaci\u00f3n de servicio a nivel de aplicaci\u00f3n o a otros estados impredecibles del sistema."
}
],
"id": "CVE-2026-2100",
"lastModified": "2026-05-19T10:16:22.840",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-03-26T21:17:04.247",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:18143"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/p11-glue/p11-kit/pull/740"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-824"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
RHSA-2026:18143
Vulnerability from csaf_redhat - Published: 2026-05-19 09:06 - Updated: 2026-05-19 09:07A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for p11-kit is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.\n\nSecurity Fix(es):\n\n* p11-kit: p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters (CVE-2026-2100)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:18143",
"url": "https://access.redhat.com/errata/RHSA-2026:18143"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.2_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/10/html/10.2_release_notes/index"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2437308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
},
{
"category": "external",
"summary": "RHEL-121792",
"url": "https://issues.redhat.com/browse/RHEL-121792"
},
{
"category": "external",
"summary": "RHEL-89706",
"url": "https://issues.redhat.com/browse/RHEL-89706"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_18143.json"
}
],
"title": "Red Hat Security Advisory: p11-kit security update",
"tracking": {
"current_release_date": "2026-05-19T09:07:04+00:00",
"generator": {
"date": "2026-05-19T09:07:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:18143",
"initial_release_date": "2026-05-19T09:06:41+00:00",
"revision_history": [
{
"date": "2026-05-19T09:06:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-19T09:06:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-19T09:07:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.2"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-devel-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-devel-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-devel-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-devel@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-server-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-server-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debugsource@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client-debuginfo@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debuginfo@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server-debuginfo@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust-debuginfo@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-client-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-client-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client@0.26.2-1.el10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-0:0.26.2-1.el10.aarch64",
"product": {
"name": "p11-kit-trust-0:0.26.2-1.el10.aarch64",
"product_id": "p11-kit-trust-0:0.26.2-1.el10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust@0.26.2-1.el10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-devel@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-server-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-server-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debugsource@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client-debuginfo@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debuginfo@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server-debuginfo@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust-debuginfo@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-client-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-client-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client@0.26.2-1.el10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"product": {
"name": "p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"product_id": "p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust@0.26.2-1.el10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-devel-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-devel-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-devel-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-devel@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-server-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-server-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debugsource@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client-debuginfo@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debuginfo@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server-debuginfo@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust-debuginfo@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-client-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-client-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client@0.26.2-1.el10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-0:0.26.2-1.el10.s390x",
"product": {
"name": "p11-kit-trust-0:0.26.2-1.el10.s390x",
"product_id": "p11-kit-trust-0:0.26.2-1.el10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust@0.26.2-1.el10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-devel-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-devel-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-devel-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-devel@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-server-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-server-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debugsource@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client-debuginfo@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-debuginfo@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-server-debuginfo@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust-debuginfo@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-client-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-client-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-client-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-client@0.26.2-1.el10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "p11-kit-trust-0:0.26.2-1.el10.x86_64",
"product": {
"name": "p11-kit-trust-0:0.26.2-1.el10.x86_64",
"product_id": "p11-kit-trust-0:0.26.2-1.el10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit-trust@0.26.2-1.el10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-0:0.26.2-1.el10.src",
"product": {
"name": "p11-kit-0:0.26.2-1.el10.src",
"product_id": "p11-kit-0:0.26.2-1.el10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.el10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.src",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "AppStream-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.src",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-client-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-devel-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-server-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-trust-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"relates_to_product_reference": "BaseOS-10.2.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
},
"product_reference": "p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"relates_to_product_reference": "BaseOS-10.2.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Zoltan Fridrich"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2026-2100",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"discovery_date": "2026-02-06T12:02:49.002000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437308"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact flaw in p11-kit allows a remote attacker to cause an application level denial of service or unpredictable system states. Exploitation occurs when the C_DeriveKey function is called on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This affects Red Hat Enterprise Linux 9.8 and 10.2, Fedora 42 and 43, and Red Hat In-Vehicle OS 2.0. Other Red Hat products, including OpenShift Container Platform and various RHEL versions, are not affected as the vulnerable code is not present.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"category": "external",
"summary": "RHBZ#2437308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2100"
},
{
"category": "external",
"summary": "https://github.com/p11-glue/p11-kit/pull/740",
"url": "https://github.com/p11-glue/p11-kit/pull/740"
}
],
"release_date": "2026-02-06T08:08:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-05-19T09:06:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:18143"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"AppStream-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"AppStream-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.src",
"BaseOS-10.2.GA:p11-kit-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-client-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-debugsource-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-devel-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-server-debuginfo-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-0:0.26.2-1.el10.x86_64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.aarch64",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.ppc64le",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.s390x",
"BaseOS-10.2.GA:p11-kit-trust-debuginfo-0:0.26.2-1.el10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters"
}
]
}
RHSA-2026:7065
Vulnerability from csaf_redhat - Published: 2026-04-08 13:22 - Updated: 2026-05-19 09:06A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:p11-kit-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:p11-kit-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:p11-kit-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:p11-kit-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7065",
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-2100",
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7065.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-19T09:06:54+00:00",
"generator": {
"date": "2026-05-19T09:06:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.8.0"
}
},
"id": "RHSA-2026:7065",
"initial_release_date": "2026-04-08T13:22:47+00:00",
"revision_history": [
{
"date": "2026-04-08T13:22:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-24T22:41:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-19T09:06:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-main@noarch",
"product": {
"name": "p11-kit-main@noarch",
"product_id": "p11-kit-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mingw32-p11-kit@0.26.2-1.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-main@aarch64",
"product": {
"name": "p11-kit-main@aarch64",
"product_id": "p11-kit-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-main@src",
"product": {
"name": "p11-kit-main@src",
"product_id": "p11-kit-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "p11-kit-main@x86_64",
"product": {
"name": "p11-kit-main@x86_64",
"product_id": "p11-kit-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/p11-kit@0.26.2-1.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:p11-kit-main@aarch64"
},
"product_reference": "p11-kit-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:p11-kit-main@noarch"
},
"product_reference": "p11-kit-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:p11-kit-main@src"
},
"product_reference": "p11-kit-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:p11-kit-main@x86_64"
},
"product_reference": "p11-kit-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Zoltan Fridrich"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2026-2100",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"discovery_date": "2026-02-06T12:02:49.002000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2437308"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact flaw in p11-kit allows a remote attacker to cause an application level denial of service or unpredictable system states. Exploitation occurs when the C_DeriveKey function is called on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This affects Red Hat Enterprise Linux 9.8 and 10.2, Fedora 42 and 43, and Red Hat In-Vehicle OS 2.0. Other Red Hat products, including OpenShift Container Platform and various RHEL versions, are not affected as the vulnerable code is not present.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:p11-kit-main@aarch64",
"Red Hat Hardened Images:p11-kit-main@noarch",
"Red Hat Hardened Images:p11-kit-main@src",
"Red Hat Hardened Images:p11-kit-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"category": "external",
"summary": "RHBZ#2437308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-2100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2100"
},
{
"category": "external",
"summary": "https://github.com/p11-glue/p11-kit/pull/740",
"url": "https://github.com/p11-glue/p11-kit/pull/740"
}
],
"release_date": "2026-02-06T08:08:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-08T13:22:47+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:p11-kit-main@aarch64",
"Red Hat Hardened Images:p11-kit-main@noarch",
"Red Hat Hardened Images:p11-kit-main@src",
"Red Hat Hardened Images:p11-kit-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:p11-kit-main@aarch64",
"Red Hat Hardened Images:p11-kit-main@noarch",
"Red Hat Hardened Images:p11-kit-main@src",
"Red Hat Hardened Images:p11-kit-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:p11-kit-main@aarch64",
"Red Hat Hardened Images:p11-kit-main@noarch",
"Red Hat Hardened Images:p11-kit-main@src",
"Red Hat Hardened Images:p11-kit-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "p11-kit: NULL dereference via C_DeriveKey with specific NULL parameters"
}
]
}
MSRC_CVE-2026-2100
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-04-30 01:48| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-2 | — |
None Available
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-2100 P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-2100.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters",
"tracking": {
"current_release_date": "2026-04-30T01:48:01.000Z",
"generator": {
"date": "2026-04-30T07:46:09.277Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-2100",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-04-02T01:05:22.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-04-03T01:39:20.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-04-30T01:48:01.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "cbl2 p11-kit 0:0.24.1-1.cbl2",
"product": {
"name": "cbl2 p11-kit 0:0.24.1-1.cbl2",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "p11-kit"
},
{
"category": "product_name",
"name": "azl3 p11-kit 0:0.25.0-1.azl3",
"product": {
"name": "azl3 p11-kit 0:0.25.0-1.azl3",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 p11-kit 0:0.24.1-1.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 p11-kit 0:0.25.0-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-2100",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17086-2"
],
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-2100 P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-2100.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-04-02T01:05:22.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17086-2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"17086-2"
]
}
],
"title": "P11-kit: p11-kit: null dereference via c_derivekey with specific null parameters"
}
]
}
GHSA-HQ85-3F6C-JX84
Vulnerability from github – Published: 2026-03-26 21:31 – Updated: 2026-05-19 12:31A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.
{
"affected": [],
"aliases": [
"CVE-2026-2100"
],
"database_specific": {
"cwe_ids": [
"CWE-824"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-26T21:17:04Z",
"severity": "MODERATE"
},
"details": "A flaw was found in p11-kit. A remote attacker could exploit this vulnerability by calling the C_DeriveKey function on a remote token with specific IBM kyber or IBM btc derive mechanism parameters set to NULL. This could lead to the RPC-client attempting to return an uninitialized value, potentially resulting in a NULL dereference or undefined behavior. This issue may cause an application level denial of service or other unpredictable system states.",
"id": "GHSA-hq85-3f6c-jx84",
"modified": "2026-05-19T12:31:37Z",
"published": "2026-03-26T21:31:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2100"
},
{
"type": "WEB",
"url": "https://github.com/p11-glue/p11-kit/pull/740"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:18143"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-2100"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2437308"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10169-1
Vulnerability from csaf_opensuse - Published: 2026-02-10 00:00 - Updated: 2026-02-10 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libp11-kit0-0.26.2-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libp11-kit0-0.26.2-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10169",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10169-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2100 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2100/"
}
],
"title": "libp11-kit0-0.26.2-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-10T00:00:00Z",
"generator": {
"date": "2026-02-10T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10169-1",
"initial_release_date": "2026-02-10T00:00:00Z",
"revision_history": [
{
"date": "2026-02-10T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libp11-kit0-0.26.2-1.1.aarch64",
"product": {
"name": "libp11-kit0-0.26.2-1.1.aarch64",
"product_id": "libp11-kit0-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libp11-kit0-32bit-0.26.2-1.1.aarch64",
"product": {
"name": "libp11-kit0-32bit-0.26.2-1.1.aarch64",
"product_id": "libp11-kit0-32bit-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-0.26.2-1.1.aarch64",
"product_id": "p11-kit-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-32bit-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-32bit-0.26.2-1.1.aarch64",
"product_id": "p11-kit-32bit-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-devel-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-devel-0.26.2-1.1.aarch64",
"product_id": "p11-kit-devel-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-nss-trust-0.26.2-1.1.aarch64",
"product_id": "p11-kit-nss-trust-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"product_id": "p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-server-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-server-0.26.2-1.1.aarch64",
"product_id": "p11-kit-server-0.26.2-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "p11-kit-tools-0.26.2-1.1.aarch64",
"product": {
"name": "p11-kit-tools-0.26.2-1.1.aarch64",
"product_id": "p11-kit-tools-0.26.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libp11-kit0-0.26.2-1.1.ppc64le",
"product": {
"name": "libp11-kit0-0.26.2-1.1.ppc64le",
"product_id": "libp11-kit0-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"product": {
"name": "libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"product_id": "libp11-kit0-32bit-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-32bit-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-32bit-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-32bit-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-devel-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-devel-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-devel-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-nss-trust-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-server-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-server-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-server-0.26.2-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "p11-kit-tools-0.26.2-1.1.ppc64le",
"product": {
"name": "p11-kit-tools-0.26.2-1.1.ppc64le",
"product_id": "p11-kit-tools-0.26.2-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libp11-kit0-0.26.2-1.1.s390x",
"product": {
"name": "libp11-kit0-0.26.2-1.1.s390x",
"product_id": "libp11-kit0-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libp11-kit0-32bit-0.26.2-1.1.s390x",
"product": {
"name": "libp11-kit0-32bit-0.26.2-1.1.s390x",
"product_id": "libp11-kit0-32bit-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-0.26.2-1.1.s390x",
"product_id": "p11-kit-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-32bit-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-32bit-0.26.2-1.1.s390x",
"product_id": "p11-kit-32bit-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-devel-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-devel-0.26.2-1.1.s390x",
"product_id": "p11-kit-devel-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-nss-trust-0.26.2-1.1.s390x",
"product_id": "p11-kit-nss-trust-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"product_id": "p11-kit-nss-trust-32bit-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-server-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-server-0.26.2-1.1.s390x",
"product_id": "p11-kit-server-0.26.2-1.1.s390x"
}
},
{
"category": "product_version",
"name": "p11-kit-tools-0.26.2-1.1.s390x",
"product": {
"name": "p11-kit-tools-0.26.2-1.1.s390x",
"product_id": "p11-kit-tools-0.26.2-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libp11-kit0-0.26.2-1.1.x86_64",
"product": {
"name": "libp11-kit0-0.26.2-1.1.x86_64",
"product_id": "libp11-kit0-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libp11-kit0-32bit-0.26.2-1.1.x86_64",
"product": {
"name": "libp11-kit0-32bit-0.26.2-1.1.x86_64",
"product_id": "libp11-kit0-32bit-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-0.26.2-1.1.x86_64",
"product_id": "p11-kit-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-32bit-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-32bit-0.26.2-1.1.x86_64",
"product_id": "p11-kit-32bit-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-devel-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-devel-0.26.2-1.1.x86_64",
"product_id": "p11-kit-devel-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-nss-trust-0.26.2-1.1.x86_64",
"product_id": "p11-kit-nss-trust-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"product_id": "p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-server-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-server-0.26.2-1.1.x86_64",
"product_id": "p11-kit-server-0.26.2-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "p11-kit-tools-0.26.2-1.1.x86_64",
"product": {
"name": "p11-kit-tools-0.26.2-1.1.x86_64",
"product_id": "p11-kit-tools-0.26.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.aarch64"
},
"product_reference": "libp11-kit0-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.ppc64le"
},
"product_reference": "libp11-kit0-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.s390x"
},
"product_reference": "libp11-kit0-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.x86_64"
},
"product_reference": "libp11-kit0-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-32bit-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.aarch64"
},
"product_reference": "libp11-kit0-32bit-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-32bit-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.ppc64le"
},
"product_reference": "libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-32bit-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.s390x"
},
"product_reference": "libp11-kit0-32bit-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libp11-kit0-32bit-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.x86_64"
},
"product_reference": "libp11-kit0-32bit-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-32bit-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-32bit-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-32bit-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-32bit-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-32bit-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-32bit-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-32bit-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-32bit-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-devel-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-devel-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-devel-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-devel-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-devel-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-nss-trust-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-nss-trust-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-nss-trust-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-server-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-server-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-server-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-server-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-server-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-tools-0.26.2-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.aarch64"
},
"product_reference": "p11-kit-tools-0.26.2-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-tools-0.26.2-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.ppc64le"
},
"product_reference": "p11-kit-tools-0.26.2-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-tools-0.26.2-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.s390x"
},
"product_reference": "p11-kit-tools-0.26.2-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "p11-kit-tools-0.26.2-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.x86_64"
},
"product_reference": "p11-kit-tools-0.26.2-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-2100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2100"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2100",
"url": "https://www.suse.com/security/cve/CVE-2026-2100"
},
{
"category": "external",
"summary": "SUSE Bug 1257820 for CVE-2026-2100",
"url": "https://bugzilla.suse.com/1257820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:libp11-kit0-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-devel-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-nss-trust-32bit-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-server-0.26.2-1.1.x86_64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.aarch64",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.ppc64le",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.s390x",
"openSUSE Tumbleweed:p11-kit-tools-0.26.2-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-10T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-2100"
}
]
}
WID-SEC-W-2026-1267
Vulnerability from csaf_certbund - Published: 2026-04-26 22:00 - Updated: 2026-05-04 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux Hardened Images RPMs
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:hardened_images_rpms
|
Hardened Images RPMs | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux Hardened Images RPMs
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:hardened_images_rpms
|
Hardened Images RPMs | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux Hardened Images RPMs
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:hardened_images_rpms
|
Hardened Images RPMs | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux Hardened Images RPMs
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:hardened_images_rpms
|
Hardened Images RPMs | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat / Enterprise Linux
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Hardened Images RPMs ausnutzen, um Sicherheitsvorkehrungen zu umgehen, Rechte zu erweitern, vertrauliche Informationen offenzulegen, Daten zu manipulieren oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1267 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1267.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1267 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7065 vom 2026-04-26",
"url": "https://access.redhat.com/errata/RHSA-2026:7065"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7369 vom 2026-04-26",
"url": "https://access.redhat.com/errata/RHSA-2026:7369"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7473 vom 2026-04-26",
"url": "https://access.redhat.com/errata/RHSA-2026:7473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:8466 vom 2026-04-26",
"url": "https://access.redhat.com/errata/RHSA-2026:8466"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21274-1 vom 2026-04-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025632.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-8409145C11 vom 2026-04-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-8409145c11"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-9A79C58AFD vom 2026-04-27",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-9a79c58afd"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13285 vom 2026-05-04",
"url": "https://access.redhat.com/errata/RHSA-2026:13285"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-12441 vom 2026-05-01",
"url": "http://linux.oracle.com/errata/ELSA-2026-12441.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:12423 vom 2026-04-30",
"url": "https://access.redhat.com/errata/RHSA-2026:12423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:12441 vom 2026-04-30",
"url": "https://access.redhat.com/errata/RHSA-2026:12441"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-12423 vom 2026-05-04",
"url": "http://linux.oracle.com/errata/ELSA-2026-12423.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Hardened Images RPMs: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-04T22:00:00.000+00:00",
"generator": {
"date": "2026-05-05T08:27:24.090+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1267",
"initial_release_date": "2026-04-26T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-26T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-05-04T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Hardened Images RPMs",
"product": {
"name": "Red Hat Enterprise Linux Hardened Images RPMs",
"product_id": "T053320",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:hardened_images_rpms"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-69277",
"product_status": {
"known_affected": [
"T053320",
"T002207",
"67646",
"T004914",
"74185"
]
},
"release_date": "2026-04-26T22:00:00.000+00:00",
"title": "CVE-2025-69277"
},
{
"cve": "CVE-2026-2100",
"product_status": {
"known_affected": [
"T053320",
"T002207",
"67646",
"T004914",
"74185"
]
},
"release_date": "2026-04-26T22:00:00.000+00:00",
"title": "CVE-2026-2100"
},
{
"cve": "CVE-2026-41989",
"product_status": {
"known_affected": [
"T053320",
"T002207",
"67646",
"T004914",
"74185"
]
},
"release_date": "2026-04-26T22:00:00.000+00:00",
"title": "CVE-2026-41989"
},
{
"cve": "CVE-2026-4878",
"product_status": {
"known_affected": [
"T053320",
"T002207",
"67646",
"T004914",
"74185"
]
},
"release_date": "2026-04-26T22:00:00.000+00:00",
"title": "CVE-2026-4878"
}
]
}
CERTFR-2026-AVI-0266
Vulnerability from certfr_avis - Published: 2026-03-11 - Updated: 2026-03-11
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.6",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 9.0.x ant\u00e9rieures \u00e0 9.0.3",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0232"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2026-2100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2100"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2026-1757",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1757"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-64118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64118"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
}
],
"initial_release_date": "2026-03-11T00:00:00",
"last_revision_date": "2026-03-11T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0266",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37185",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37185"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37184",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37184"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37182",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37182"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37183",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37183"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37186",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37186"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.